CVE-2025-67876: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ChurchCRM CRM
ChurchCRM is an open-source church management system. A stored cross-site scripting (XSS) vulnerability exists in ChurchCRM versions 6.4.0 and prior that allows a low-privilege user with the “Manage Groups” permission to inject persistent JavaScript into group role names. The payload is saved in the database and executed whenever any user (including administrators) views a page that displays that role, such as GroupView.php or PersonView.php. This allows full session hijacking and account takeover. As of time of publication, no known patched versions are available.
AI Analysis
Technical Summary
CVE-2025-67876 is a critical stored cross-site scripting (XSS) vulnerability affecting ChurchCRM, an open-source church management system widely used for managing congregational data and activities. The vulnerability exists in versions 6.4.0 and prior, where a low-privilege user granted the 'Manage Groups' permission can inject malicious JavaScript code into group role names. These role names are stored persistently in the database and rendered on pages such as GroupView.php and PersonView.php. When any user, including administrators, accesses these pages, the injected script executes in their browser context. This allows attackers to hijack user sessions, steal authentication tokens, and potentially take over accounts. The vulnerability does not require prior authentication beyond the 'Manage Groups' permission, nor does it require user interaction beyond viewing the affected pages. The CVSS 4.0 score of 9.3 reflects the high impact on confidentiality, integrity, and availability, combined with ease of exploitation and broad scope. No patches or fixes are currently available, increasing the urgency for defensive measures. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. Although no known exploits are reported in the wild yet, the critical nature and ease of exploitation make it a significant threat to organizations relying on ChurchCRM.
Potential Impact
For European organizations using ChurchCRM, this vulnerability poses a severe risk of unauthorized access and data compromise. Attackers exploiting this flaw can hijack sessions of administrators and other users, leading to full account takeover. This can result in unauthorized data access, manipulation of sensitive congregational information, disruption of church operations, and potential reputational damage. Since the vulnerability allows persistent script injection, it can be used to establish long-term footholds or pivot to other internal systems if integrated with broader IT infrastructure. The impact is particularly critical for organizations with many users and complex role-based permissions, as the attack surface increases. Additionally, compromised accounts could be leveraged to distribute malware or phishing campaigns within the community. The lack of a patch means organizations must rely on mitigations and monitoring, increasing operational overhead and risk exposure.
Mitigation Recommendations
Until an official patch is released, European organizations should implement several targeted mitigations: 1) Restrict the 'Manage Groups' permission strictly to trusted users only, minimizing the number of accounts that can inject malicious input. 2) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious JavaScript payloads in HTTP requests related to group role management. 3) Implement server-side input validation and sanitization for group role names, ideally using a whitelist approach to allow only safe characters. 4) Monitor logs and user activity for unusual behavior, such as unexpected changes to group roles or repeated access to affected pages. 5) Educate users, especially administrators, to recognize signs of session hijacking or unusual account activity. 6) Consider isolating ChurchCRM instances from critical networks to limit lateral movement if compromised. 7) Regularly back up data to enable recovery from potential data integrity attacks. 8) Engage with the ChurchCRM community or maintainers to track patch releases and apply updates promptly once available.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-67876: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ChurchCRM CRM
Description
ChurchCRM is an open-source church management system. A stored cross-site scripting (XSS) vulnerability exists in ChurchCRM versions 6.4.0 and prior that allows a low-privilege user with the “Manage Groups” permission to inject persistent JavaScript into group role names. The payload is saved in the database and executed whenever any user (including administrators) views a page that displays that role, such as GroupView.php or PersonView.php. This allows full session hijacking and account takeover. As of time of publication, no known patched versions are available.
AI-Powered Analysis
Technical Analysis
CVE-2025-67876 is a critical stored cross-site scripting (XSS) vulnerability affecting ChurchCRM, an open-source church management system widely used for managing congregational data and activities. The vulnerability exists in versions 6.4.0 and prior, where a low-privilege user granted the 'Manage Groups' permission can inject malicious JavaScript code into group role names. These role names are stored persistently in the database and rendered on pages such as GroupView.php and PersonView.php. When any user, including administrators, accesses these pages, the injected script executes in their browser context. This allows attackers to hijack user sessions, steal authentication tokens, and potentially take over accounts. The vulnerability does not require prior authentication beyond the 'Manage Groups' permission, nor does it require user interaction beyond viewing the affected pages. The CVSS 4.0 score of 9.3 reflects the high impact on confidentiality, integrity, and availability, combined with ease of exploitation and broad scope. No patches or fixes are currently available, increasing the urgency for defensive measures. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. Although no known exploits are reported in the wild yet, the critical nature and ease of exploitation make it a significant threat to organizations relying on ChurchCRM.
Potential Impact
For European organizations using ChurchCRM, this vulnerability poses a severe risk of unauthorized access and data compromise. Attackers exploiting this flaw can hijack sessions of administrators and other users, leading to full account takeover. This can result in unauthorized data access, manipulation of sensitive congregational information, disruption of church operations, and potential reputational damage. Since the vulnerability allows persistent script injection, it can be used to establish long-term footholds or pivot to other internal systems if integrated with broader IT infrastructure. The impact is particularly critical for organizations with many users and complex role-based permissions, as the attack surface increases. Additionally, compromised accounts could be leveraged to distribute malware or phishing campaigns within the community. The lack of a patch means organizations must rely on mitigations and monitoring, increasing operational overhead and risk exposure.
Mitigation Recommendations
Until an official patch is released, European organizations should implement several targeted mitigations: 1) Restrict the 'Manage Groups' permission strictly to trusted users only, minimizing the number of accounts that can inject malicious input. 2) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious JavaScript payloads in HTTP requests related to group role management. 3) Implement server-side input validation and sanitization for group role names, ideally using a whitelist approach to allow only safe characters. 4) Monitor logs and user activity for unusual behavior, such as unexpected changes to group roles or repeated access to affected pages. 5) Educate users, especially administrators, to recognize signs of session hijacking or unusual account activity. 6) Consider isolating ChurchCRM instances from critical networks to limit lateral movement if compromised. 7) Regularly back up data to enable recovery from potential data integrity attacks. 8) Engage with the ChurchCRM community or maintainers to track patch releases and apply updates promptly once available.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-12T18:53:03.237Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69431f35fab815a9fc1ded24
Added to database: 12/17/2025, 9:23:01 PM
Last enriched: 12/24/2025, 9:51:54 PM
Last updated: 2/7/2026, 6:39:01 AM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumCVE-2025-12159: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.