Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67876: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ChurchCRM CRM

0
Critical
VulnerabilityCVE-2025-67876cvecve-2025-67876cwe-79
Published: Wed Dec 17 2025 (12/17/2025, 21:18:21 UTC)
Source: CVE Database V5
Vendor/Project: ChurchCRM
Product: CRM

Description

ChurchCRM is an open-source church management system. A stored cross-site scripting (XSS) vulnerability exists in ChurchCRM versions 6.4.0 and prior that allows a low-privilege user with the “Manage Groups” permission to inject persistent JavaScript into group role names. The payload is saved in the database and executed whenever any user (including administrators) views a page that displays that role, such as GroupView.php or PersonView.php. This allows full session hijacking and account takeover. As of time of publication, no known patched versions are available.

AI-Powered Analysis

AILast updated: 12/24/2025, 21:51:54 UTC

Technical Analysis

CVE-2025-67876 is a critical stored cross-site scripting (XSS) vulnerability affecting ChurchCRM, an open-source church management system widely used for managing congregational data and activities. The vulnerability exists in versions 6.4.0 and prior, where a low-privilege user granted the 'Manage Groups' permission can inject malicious JavaScript code into group role names. These role names are stored persistently in the database and rendered on pages such as GroupView.php and PersonView.php. When any user, including administrators, accesses these pages, the injected script executes in their browser context. This allows attackers to hijack user sessions, steal authentication tokens, and potentially take over accounts. The vulnerability does not require prior authentication beyond the 'Manage Groups' permission, nor does it require user interaction beyond viewing the affected pages. The CVSS 4.0 score of 9.3 reflects the high impact on confidentiality, integrity, and availability, combined with ease of exploitation and broad scope. No patches or fixes are currently available, increasing the urgency for defensive measures. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. Although no known exploits are reported in the wild yet, the critical nature and ease of exploitation make it a significant threat to organizations relying on ChurchCRM.

Potential Impact

For European organizations using ChurchCRM, this vulnerability poses a severe risk of unauthorized access and data compromise. Attackers exploiting this flaw can hijack sessions of administrators and other users, leading to full account takeover. This can result in unauthorized data access, manipulation of sensitive congregational information, disruption of church operations, and potential reputational damage. Since the vulnerability allows persistent script injection, it can be used to establish long-term footholds or pivot to other internal systems if integrated with broader IT infrastructure. The impact is particularly critical for organizations with many users and complex role-based permissions, as the attack surface increases. Additionally, compromised accounts could be leveraged to distribute malware or phishing campaigns within the community. The lack of a patch means organizations must rely on mitigations and monitoring, increasing operational overhead and risk exposure.

Mitigation Recommendations

Until an official patch is released, European organizations should implement several targeted mitigations: 1) Restrict the 'Manage Groups' permission strictly to trusted users only, minimizing the number of accounts that can inject malicious input. 2) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious JavaScript payloads in HTTP requests related to group role management. 3) Implement server-side input validation and sanitization for group role names, ideally using a whitelist approach to allow only safe characters. 4) Monitor logs and user activity for unusual behavior, such as unexpected changes to group roles or repeated access to affected pages. 5) Educate users, especially administrators, to recognize signs of session hijacking or unusual account activity. 6) Consider isolating ChurchCRM instances from critical networks to limit lateral movement if compromised. 7) Regularly back up data to enable recovery from potential data integrity attacks. 8) Engage with the ChurchCRM community or maintainers to track patch releases and apply updates promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-12T18:53:03.237Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69431f35fab815a9fc1ded24

Added to database: 12/17/2025, 9:23:01 PM

Last enriched: 12/24/2025, 9:51:54 PM

Last updated: 2/7/2026, 2:18:47 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats