Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66397: CWE-284: Improper Access Control in ChurchCRM CRM

0
High
VulnerabilityCVE-2025-66397cvecve-2025-66397cwe-284
Published: Wed Dec 17 2025 (12/17/2025, 19:12:41 UTC)
Source: CVE Database V5
Vendor/Project: ChurchCRM
Product: CRM

Description

ChurchCRM is an open-source church management system. Prior to version 6.5.3, the allowRegistration, acceptKiosk, reloadKiosk, and identifyKiosk functions in the Kiosk Manager feature suffers from broken access control, allowing any authenticated user to allow and accept kiosk registrations, and perform other Kiosk Manager actions such as reload and identify. Version 6.5.3 fixes the issue.

AI-Powered Analysis

AILast updated: 12/17/2025, 19:36:01 UTC

Technical Analysis

CVE-2025-66397 is an improper access control vulnerability (CWE-284) identified in the ChurchCRM open-source church management system, specifically affecting versions prior to 6.5.3. The vulnerability resides in the Kiosk Manager feature, where functions such as allowRegistration, acceptKiosk, reloadKiosk, and identifyKiosk do not enforce proper access restrictions. As a result, any authenticated user, regardless of their privilege level, can invoke these functions to manipulate kiosk registrations and operations. This can lead to unauthorized acceptance of kiosk registrations, forced reloads, and identification of kiosks, potentially disrupting normal operations and compromising data integrity. The vulnerability has a CVSS 3.1 base score of 8.3, indicating high severity, with an attack vector over the network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and impacts on confidentiality (C:L), integrity (I:H), and availability (A:H). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to organizations relying on ChurchCRM for managing community and church-related data. The issue was addressed in ChurchCRM version 6.5.3 by implementing proper access control checks on the affected functions.

Potential Impact

For European organizations, particularly religious institutions and community groups using ChurchCRM, this vulnerability could lead to unauthorized manipulation of kiosk registrations and operations. This may result in unauthorized data entry or modification, disruption of kiosk services, and potential exposure of sensitive information related to church members or events. The integrity and availability of the kiosk management system can be compromised, potentially affecting operational continuity and trust. Given the high CVSS score and the nature of the vulnerability, attackers with basic authenticated access could escalate their privileges within the system, leading to broader security implications. The impact is more pronounced in organizations that rely heavily on kiosk features for member registration or event management, which are common in many European countries with active church communities.

Mitigation Recommendations

The primary mitigation is to upgrade ChurchCRM installations to version 6.5.3 or later, where the vulnerability has been fixed. Organizations should immediately audit their current ChurchCRM version and plan for prompt patching. Additionally, review and tighten user access controls to limit authenticated user permissions, especially concerning kiosk management functions. Implement monitoring and logging of kiosk-related activities to detect any unauthorized actions. If upgrading immediately is not feasible, consider restricting network access to the ChurchCRM application to trusted users only and disable kiosk features temporarily if possible. Educate users about the risks of unauthorized access and enforce strong authentication mechanisms to reduce the risk of credential compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-28T23:33:56.363Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694302860b6f32e62bed0eba

Added to database: 12/17/2025, 7:20:38 PM

Last enriched: 12/17/2025, 7:36:01 PM

Last updated: 12/18/2025, 3:54:11 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats