Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67875: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ChurchCRM CRM

0
High
VulnerabilityCVE-2025-67875cvecve-2025-67875cwe-79
Published: Wed Dec 17 2025 (12/17/2025, 21:16:16 UTC)
Source: CVE Database V5
Vendor/Project: ChurchCRM
Product: CRM

Description

ChurchCRM is an open-source church management system. A privilege escalation vulnerability exists in ChurchCRM prior to version 6.5.3. An authenticated user with specific mid-level permissions ("Edit Records" and "Manage Properties and Classifications") can inject a persistent Cross-Site Scripting (XSS) payload into an administrator's profile. The payload executes when the administrator views their own profile page, allowing the attacker to hijack the administrator's session, perform administrative actions, and achieve a full account takeover. This vulnerability is a combination of two separate flaws: an Insecure Direct Object Reference (IDOR) that allows any user to view any other user's profile, and a Broken Access Control vulnerability that allows a user with general edit permissions to modify any other user's record properties. Version 6.5.3 fixes the issue.

AI-Powered Analysis

AILast updated: 12/17/2025, 21:37:18 UTC

Technical Analysis

CVE-2025-67875 is a critical security vulnerability affecting ChurchCRM, an open-source church management system, in versions prior to 6.5.3. The vulnerability arises from improper neutralization of input during web page generation, classified as CWE-79 (Cross-Site Scripting). Specifically, an authenticated user with mid-level permissions — namely 'Edit Records' and 'Manage Properties and Classifications' — can exploit two underlying flaws: an Insecure Direct Object Reference (IDOR) that permits viewing any user's profile, and Broken Access Control that allows modification of any user's record properties. By leveraging these, the attacker injects a persistent XSS payload into an administrator's profile. When the administrator subsequently views their profile page, the malicious script executes in their browser context, enabling session hijacking and unauthorized administrative actions, culminating in full account takeover. The vulnerability is remotely exploitable over the network without requiring elevated privileges beyond the specified mid-level permissions and requires only that the administrator views their profile page (user interaction). The CVSS 4.0 base score is 8.5, reflecting high severity due to the potential for complete administrative compromise and system control. No known exploits are currently reported in the wild. The issue is resolved in ChurchCRM version 6.5.3, which implements proper input validation and access control mechanisms to prevent unauthorized profile viewing and modification.

Potential Impact

For European organizations using ChurchCRM, this vulnerability poses a significant risk of administrative account compromise, which can lead to unauthorized access to sensitive church member data, manipulation of records, and potential disruption of church operations. Given that ChurchCRM manages personal and organizational data, exploitation could result in confidentiality breaches, data integrity violations, and availability impacts if attackers modify or delete critical information. The ability to hijack administrator sessions and perform administrative actions could also facilitate further lateral movement or persistence within the organization's IT environment. The impact is particularly critical for organizations relying heavily on ChurchCRM for member management and communication, as trust and privacy are paramount. Additionally, regulatory compliance risks under GDPR arise if personal data is exposed or mishandled due to this vulnerability.

Mitigation Recommendations

European organizations should immediately upgrade ChurchCRM installations to version 6.5.3 or later, where the vulnerability is patched. Until the update is applied, restrict mid-level permissions ('Edit Records' and 'Manage Properties and Classifications') to only trusted users and audit existing user roles to minimize exposure. Implement web application firewalls (WAFs) with rules to detect and block XSS payloads targeting profile pages. Conduct regular monitoring of administrator account activities for anomalies indicating possible compromise. Educate administrators to be cautious when viewing profiles and report suspicious behavior. Additionally, apply strict Content Security Policy (CSP) headers to limit script execution contexts and reduce XSS impact. Finally, perform periodic security assessments of ChurchCRM deployments to identify and remediate any residual access control weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-12T18:53:03.237Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69431f35fab815a9fc1ded21

Added to database: 12/17/2025, 9:23:01 PM

Last enriched: 12/17/2025, 9:37:18 PM

Last updated: 12/18/2025, 3:07:08 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats