Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67751: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ChurchCRM CRM

0
High
VulnerabilityCVE-2025-67751cvecve-2025-67751cwe-89
Published: Tue Dec 16 2025 (12/16/2025, 00:46:30 UTC)
Source: CVE Database V5
Vendor/Project: ChurchCRM
Product: CRM

Description

ChurchCRM is an open-source church management system. Prior to version 6.5.0, a SQL injection vulnerability exists in the `EventEditor.php` file. When creating a new event and selecting an event type, the `EN_tyid` POST parameter is not sanitized. This allows an authenticated user with event management permissions (`isAddEvent`) to execute arbitrary SQL queries. Version 6.5.0 fixes the issue.

AI-Powered Analysis

AILast updated: 12/23/2025, 04:49:12 UTC

Technical Analysis

CVE-2025-67751 is a SQL injection vulnerability classified under CWE-89 affecting ChurchCRM, an open-source church management system. The flaw exists in the EventEditor.php file in versions prior to 6.5.0, specifically in the handling of the EN_tyid POST parameter when creating new events. This parameter is not properly sanitized, allowing an authenticated user with the isAddEvent permission to inject arbitrary SQL commands. The vulnerability enables attackers to manipulate backend database queries, potentially leading to unauthorized data disclosure, data modification, or deletion, and disruption of service. The CVSS v3.1 base score is 7.2, reflecting high severity due to network attack vector, low attack complexity, required privileges, no user interaction, and high impact on confidentiality, integrity, and availability. No public exploits are currently known, but the vulnerability is critical for organizations relying on ChurchCRM for managing sensitive community data. The fix in version 6.5.0 involves proper input validation and sanitization of the EN_tyid parameter to prevent injection attacks.

Potential Impact

For European organizations using ChurchCRM, this vulnerability could lead to severe consequences including unauthorized access to sensitive personal and organizational data, data corruption, or complete loss of service availability. Given that ChurchCRM is used by religious and community organizations, a successful exploit could damage trust, violate data protection regulations such as GDPR, and cause operational disruptions. The ability to execute arbitrary SQL commands means attackers could exfiltrate confidential information or alter records, impacting data integrity. Since the vulnerability requires authenticated access with event management permissions, insider threats or compromised accounts pose a significant risk. The impact extends beyond data loss to potential reputational damage and legal liabilities under European data protection laws.

Mitigation Recommendations

European organizations should immediately upgrade ChurchCRM installations to version 6.5.0 or later to apply the official patch. Until upgrading is possible, restrict event management permissions (isAddEvent) to the minimum necessary users and monitor logs for suspicious activity related to event creation. Implement web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the EN_tyid parameter. Conduct regular security audits and penetration testing focusing on input validation controls. Additionally, enforce strong authentication and session management to reduce the risk of compromised accounts. Backup databases frequently and verify backup integrity to enable recovery in case of data corruption. Finally, educate administrators and users about the risks of privilege misuse and encourage prompt application of security updates.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-11T20:30:54.927Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6940b2a5d9bcdf3f3d15a2ef

Added to database: 12/16/2025, 1:15:17 AM

Last enriched: 12/23/2025, 4:49:12 AM

Last updated: 2/7/2026, 9:34:08 AM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats