CVE-2025-66397: CWE-284: Improper Access Control in ChurchCRM CRM
ChurchCRM is an open-source church management system. Prior to version 6.5.3, the allowRegistration, acceptKiosk, reloadKiosk, and identifyKiosk functions in the Kiosk Manager feature suffers from broken access control, allowing any authenticated user to allow and accept kiosk registrations, and perform other Kiosk Manager actions such as reload and identify. Version 6.5.3 fixes the issue.
AI Analysis
Technical Summary
CVE-2025-66397 is an improper access control vulnerability (CWE-284) identified in the ChurchCRM open-source church management system, specifically affecting versions prior to 6.5.3. The vulnerability resides in the Kiosk Manager feature, where functions such as allowRegistration, acceptKiosk, reloadKiosk, and identifyKiosk do not enforce proper access restrictions. As a result, any authenticated user, regardless of their privilege level, can invoke these functions to manipulate kiosk registrations and operations. This can lead to unauthorized acceptance of kiosk registrations, forced reloads, and identification of kiosks, potentially disrupting normal operations and compromising data integrity. The vulnerability has a CVSS 3.1 base score of 8.3, indicating high severity, with an attack vector over the network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and impacts on confidentiality (C:L), integrity (I:H), and availability (A:H). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to organizations relying on ChurchCRM for managing community and church-related data. The issue was addressed in ChurchCRM version 6.5.3 by implementing proper access control checks on the affected functions.
Potential Impact
For European organizations, particularly religious institutions and community groups using ChurchCRM, this vulnerability could lead to unauthorized manipulation of kiosk registrations and operations. This may result in unauthorized data entry or modification, disruption of kiosk services, and potential exposure of sensitive information related to church members or events. The integrity and availability of the kiosk management system can be compromised, potentially affecting operational continuity and trust. Given the high CVSS score and the nature of the vulnerability, attackers with basic authenticated access could escalate their privileges within the system, leading to broader security implications. The impact is more pronounced in organizations that rely heavily on kiosk features for member registration or event management, which are common in many European countries with active church communities.
Mitigation Recommendations
The primary mitigation is to upgrade ChurchCRM installations to version 6.5.3 or later, where the vulnerability has been fixed. Organizations should immediately audit their current ChurchCRM version and plan for prompt patching. Additionally, review and tighten user access controls to limit authenticated user permissions, especially concerning kiosk management functions. Implement monitoring and logging of kiosk-related activities to detect any unauthorized actions. If upgrading immediately is not feasible, consider restricting network access to the ChurchCRM application to trusted users only and disable kiosk features temporarily if possible. Educate users about the risks of unauthorized access and enforce strong authentication mechanisms to reduce the risk of credential compromise.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Poland, Netherlands
CVE-2025-66397: CWE-284: Improper Access Control in ChurchCRM CRM
Description
ChurchCRM is an open-source church management system. Prior to version 6.5.3, the allowRegistration, acceptKiosk, reloadKiosk, and identifyKiosk functions in the Kiosk Manager feature suffers from broken access control, allowing any authenticated user to allow and accept kiosk registrations, and perform other Kiosk Manager actions such as reload and identify. Version 6.5.3 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-66397 is an improper access control vulnerability (CWE-284) identified in the ChurchCRM open-source church management system, specifically affecting versions prior to 6.5.3. The vulnerability resides in the Kiosk Manager feature, where functions such as allowRegistration, acceptKiosk, reloadKiosk, and identifyKiosk do not enforce proper access restrictions. As a result, any authenticated user, regardless of their privilege level, can invoke these functions to manipulate kiosk registrations and operations. This can lead to unauthorized acceptance of kiosk registrations, forced reloads, and identification of kiosks, potentially disrupting normal operations and compromising data integrity. The vulnerability has a CVSS 3.1 base score of 8.3, indicating high severity, with an attack vector over the network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and impacts on confidentiality (C:L), integrity (I:H), and availability (A:H). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to organizations relying on ChurchCRM for managing community and church-related data. The issue was addressed in ChurchCRM version 6.5.3 by implementing proper access control checks on the affected functions.
Potential Impact
For European organizations, particularly religious institutions and community groups using ChurchCRM, this vulnerability could lead to unauthorized manipulation of kiosk registrations and operations. This may result in unauthorized data entry or modification, disruption of kiosk services, and potential exposure of sensitive information related to church members or events. The integrity and availability of the kiosk management system can be compromised, potentially affecting operational continuity and trust. Given the high CVSS score and the nature of the vulnerability, attackers with basic authenticated access could escalate their privileges within the system, leading to broader security implications. The impact is more pronounced in organizations that rely heavily on kiosk features for member registration or event management, which are common in many European countries with active church communities.
Mitigation Recommendations
The primary mitigation is to upgrade ChurchCRM installations to version 6.5.3 or later, where the vulnerability has been fixed. Organizations should immediately audit their current ChurchCRM version and plan for prompt patching. Additionally, review and tighten user access controls to limit authenticated user permissions, especially concerning kiosk management functions. Implement monitoring and logging of kiosk-related activities to detect any unauthorized actions. If upgrading immediately is not feasible, consider restricting network access to the ChurchCRM application to trusted users only and disable kiosk features temporarily if possible. Educate users about the risks of unauthorized access and enforce strong authentication mechanisms to reduce the risk of credential compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-28T23:33:56.363Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 694302860b6f32e62bed0eba
Added to database: 12/17/2025, 7:20:38 PM
Last enriched: 12/17/2025, 7:36:01 PM
Last updated: 12/18/2025, 3:54:11 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14856: Code Injection in y_project RuoYi
MediumCVE-2025-14841: NULL Pointer Dereference in OFFIS DCMTK
MediumCVE-2025-14837: Code Injection in ZZCMS
MediumCVE-2025-14836: Cleartext Storage in a File or on Disk in ZZCMS
MediumCVE-2025-14834: SQL Injection in code-projects Simple Stock System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.