CVE-2025-67876: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ChurchCRM CRM
ChurchCRM is an open-source church management system. A stored cross-site scripting (XSS) vulnerability exists in ChurchCRM versions 6.4.0 and prior that allows a low-privilege user with the “Manage Groups” permission to inject persistent JavaScript into group role names. The payload is saved in the database and executed whenever any user (including administrators) views a page that displays that role, such as GroupView.php or PersonView.php. This allows full session hijacking and account takeover. As of time of publication, no known patched versions are available.
AI Analysis
Technical Summary
CVE-2025-67876 is a stored cross-site scripting (XSS) vulnerability identified in ChurchCRM, an open-source church management system widely used for managing congregational data and activities. The vulnerability affects versions 6.4.0 and earlier. It arises from improper neutralization of input during web page generation (CWE-79), specifically in the handling of group role names. A user with the 'Manage Groups' permission, which is a low-privilege role, can inject malicious JavaScript code into the role name fields. This malicious payload is stored persistently in the ChurchCRM database. Whenever any user, including administrators, accesses pages such as GroupView.php or PersonView.php that display these group roles, the injected script executes in their browser context. This execution enables attackers to hijack user sessions, steal authentication tokens, and potentially take over accounts, including those with administrative privileges. The vulnerability does not require the attacker to have high privileges or prior authentication but does require the ability to manage groups and for victims to view the affected pages. No patches or updates addressing this vulnerability are currently available, increasing the risk of exploitation once the vulnerability becomes widely known. The CVSS 4.0 score of 9.3 reflects the vulnerability's critical nature, with network attack vector, low attack complexity, no required authentication, and high impacts on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the potential for damage is significant given the persistent nature of the XSS and the ability to compromise administrative accounts.
Potential Impact
For European organizations using ChurchCRM, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive organizational and personal data managed within the CRM. Exploitation could lead to unauthorized access to user accounts, including administrators, enabling attackers to manipulate data, disrupt operations, or exfiltrate confidential information. Given that church management systems often contain personal data of congregants, including contact details and possibly financial information, a breach could also have privacy and regulatory compliance implications under GDPR. The persistent nature of the XSS means that multiple users can be affected over time, increasing the scope of impact. Additionally, session hijacking can facilitate lateral movement within the system, potentially compromising other integrated services or data. The lack of a patch increases the window of exposure, making timely mitigation critical. The impact extends beyond technical damage to reputational harm and potential legal consequences for failing to protect personal data adequately.
Mitigation Recommendations
Until an official patch is released, European organizations should implement several targeted mitigation strategies. First, restrict the 'Manage Groups' permission strictly to trusted users and review current role assignments to minimize the number of users who can inject malicious input. Implement input validation and sanitization at the application or web server level, if possible, to detect and block suspicious scripts in group role names. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing ChurchCRM. Monitor logs and user activity for unusual behavior, particularly changes to group roles and unexpected script execution. Consider isolating ChurchCRM instances from critical networks and sensitive data environments to limit potential damage. Educate users, especially administrators, to be cautious when viewing group-related pages and to report anomalies. Finally, maintain regular backups of the CRM database to enable recovery if an attack occurs. Organizations should also stay alert for updates from ChurchCRM developers and apply patches promptly once available.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-67876: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ChurchCRM CRM
Description
ChurchCRM is an open-source church management system. A stored cross-site scripting (XSS) vulnerability exists in ChurchCRM versions 6.4.0 and prior that allows a low-privilege user with the “Manage Groups” permission to inject persistent JavaScript into group role names. The payload is saved in the database and executed whenever any user (including administrators) views a page that displays that role, such as GroupView.php or PersonView.php. This allows full session hijacking and account takeover. As of time of publication, no known patched versions are available.
AI-Powered Analysis
Technical Analysis
CVE-2025-67876 is a stored cross-site scripting (XSS) vulnerability identified in ChurchCRM, an open-source church management system widely used for managing congregational data and activities. The vulnerability affects versions 6.4.0 and earlier. It arises from improper neutralization of input during web page generation (CWE-79), specifically in the handling of group role names. A user with the 'Manage Groups' permission, which is a low-privilege role, can inject malicious JavaScript code into the role name fields. This malicious payload is stored persistently in the ChurchCRM database. Whenever any user, including administrators, accesses pages such as GroupView.php or PersonView.php that display these group roles, the injected script executes in their browser context. This execution enables attackers to hijack user sessions, steal authentication tokens, and potentially take over accounts, including those with administrative privileges. The vulnerability does not require the attacker to have high privileges or prior authentication but does require the ability to manage groups and for victims to view the affected pages. No patches or updates addressing this vulnerability are currently available, increasing the risk of exploitation once the vulnerability becomes widely known. The CVSS 4.0 score of 9.3 reflects the vulnerability's critical nature, with network attack vector, low attack complexity, no required authentication, and high impacts on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the potential for damage is significant given the persistent nature of the XSS and the ability to compromise administrative accounts.
Potential Impact
For European organizations using ChurchCRM, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive organizational and personal data managed within the CRM. Exploitation could lead to unauthorized access to user accounts, including administrators, enabling attackers to manipulate data, disrupt operations, or exfiltrate confidential information. Given that church management systems often contain personal data of congregants, including contact details and possibly financial information, a breach could also have privacy and regulatory compliance implications under GDPR. The persistent nature of the XSS means that multiple users can be affected over time, increasing the scope of impact. Additionally, session hijacking can facilitate lateral movement within the system, potentially compromising other integrated services or data. The lack of a patch increases the window of exposure, making timely mitigation critical. The impact extends beyond technical damage to reputational harm and potential legal consequences for failing to protect personal data adequately.
Mitigation Recommendations
Until an official patch is released, European organizations should implement several targeted mitigation strategies. First, restrict the 'Manage Groups' permission strictly to trusted users and review current role assignments to minimize the number of users who can inject malicious input. Implement input validation and sanitization at the application or web server level, if possible, to detect and block suspicious scripts in group role names. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing ChurchCRM. Monitor logs and user activity for unusual behavior, particularly changes to group roles and unexpected script execution. Consider isolating ChurchCRM instances from critical networks and sensitive data environments to limit potential damage. Educate users, especially administrators, to be cautious when viewing group-related pages and to report anomalies. Finally, maintain regular backups of the CRM database to enable recovery if an attack occurs. Organizations should also stay alert for updates from ChurchCRM developers and apply patches promptly once available.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-12T18:53:03.237Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69431f35fab815a9fc1ded24
Added to database: 12/17/2025, 9:23:01 PM
Last enriched: 12/17/2025, 9:37:08 PM
Last updated: 12/18/2025, 3:06:52 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14856: Code Injection in y_project RuoYi
MediumCVE-2025-14841: NULL Pointer Dereference in OFFIS DCMTK
MediumCVE-2025-14837: Code Injection in ZZCMS
MediumCVE-2025-14836: Cleartext Storage in a File or on Disk in ZZCMS
MediumCVE-2025-14834: SQL Injection in code-projects Simple Stock System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.