Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67877: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ChurchCRM CRM

0
High
VulnerabilityCVE-2025-67877cvecve-2025-67877cwe-89
Published: Wed Dec 17 2025 (12/17/2025, 21:25:18 UTC)
Source: CVE Database V5
Vendor/Project: ChurchCRM
Product: CRM

Description

ChurchCRM is an open-source church management system. Versions prior to 6.5.3 have a SQL injection vulnerability in the `src/CartToFamily.php` file, specifically in how the `PersonAddress` POST parameter is handled. Unlike other parameters in the same file which are correctly cast to integers using the `InputUtils` class, the `PersonAddress` parameter is missing the type definition. This allows an attacker to inject arbitrary SQL commands directly into the query. Version 6.5.3 fixes the issue.

AI-Powered Analysis

AILast updated: 12/24/2025, 22:55:05 UTC

Technical Analysis

CVE-2025-67877 is a SQL injection vulnerability identified in the open-source ChurchCRM software, specifically in versions prior to 6.5.3. The vulnerability arises from improper input validation in the src/CartToFamily.php file, where the PersonAddress POST parameter is handled without the necessary type casting or sanitization. While other parameters in the same file are securely cast to integers using the InputUtils class, PersonAddress lacks this protection, allowing malicious actors to inject specially crafted SQL commands directly into the backend database query. This flaw falls under CWE-89, which concerns improper neutralization of special elements used in SQL commands. The vulnerability has a CVSS 4.0 base score of 7.4, indicating high severity, with metrics showing network attack vector, low attack complexity, no user interaction, and low privileges required. The impact on confidentiality, integrity, and availability is high, as attackers can manipulate database queries to exfiltrate sensitive data, modify records, or disrupt service. Although no known exploits are currently reported in the wild, the vulnerability is publicly disclosed and fixed in ChurchCRM version 6.5.3. Organizations running vulnerable versions should upgrade promptly to mitigate risk.

Potential Impact

For European organizations using ChurchCRM, this vulnerability poses significant risks including unauthorized access to sensitive personal data of church members, alteration or deletion of records, and potential disruption of church management operations. Given that ChurchCRM is used primarily by religious and non-profit organizations, the breach of personal data could lead to privacy violations under GDPR, resulting in regulatory penalties and reputational damage. The ability to execute arbitrary SQL commands could also allow attackers to pivot within the network if the CRM database is integrated with other systems. The lack of required user interaction and low privilege requirements increase the likelihood of exploitation once an attacker has authenticated access, which may be easier to obtain through phishing or credential reuse. The impact is compounded in environments where ChurchCRM databases contain extensive personal or financial information.

Mitigation Recommendations

European organizations should immediately upgrade ChurchCRM installations to version 6.5.3 or later, where the vulnerability is patched. Until the upgrade is applied, organizations should implement strict input validation and sanitization on the PersonAddress parameter at the web application firewall (WAF) or reverse proxy level to block SQL injection payloads. Employing parameterized queries or prepared statements in custom integrations can further reduce risk. Monitoring database logs for unusual queries and setting up alerts for suspicious activity related to the CartToFamily.php endpoint is recommended. Additionally, enforcing strong authentication controls and limiting user privileges can reduce the attack surface. Regular security audits and penetration testing focused on input validation in ChurchCRM deployments will help detect similar issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-12T18:53:03.237Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6943229bfab815a9fc1fb3e0

Added to database: 12/17/2025, 9:37:31 PM

Last enriched: 12/24/2025, 10:55:05 PM

Last updated: 2/7/2026, 11:37:06 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats