CVE-2025-67877: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ChurchCRM CRM
ChurchCRM is an open-source church management system. Versions prior to 6.5.3 have a SQL injection vulnerability in the `src/CartToFamily.php` file, specifically in how the `PersonAddress` POST parameter is handled. Unlike other parameters in the same file which are correctly cast to integers using the `InputUtils` class, the `PersonAddress` parameter is missing the type definition. This allows an attacker to inject arbitrary SQL commands directly into the query. Version 6.5.3 fixes the issue.
AI Analysis
Technical Summary
CVE-2025-67877 is a SQL injection vulnerability classified under CWE-89, found in the open-source ChurchCRM church management system. The vulnerability arises from improper input validation in the src/CartToFamily.php file, specifically in the handling of the PersonAddress POST parameter. Unlike other parameters that are cast to integers using the InputUtils class, PersonAddress lacks this type enforcement, allowing malicious actors to inject specially crafted SQL payloads directly into backend queries. This flaw enables attackers to execute arbitrary SQL commands, potentially leading to unauthorized data access, data modification, or deletion within the ChurchCRM database. The vulnerability has a CVSS 4.0 base score of 7.4, indicating high severity, with attack vector being network-based, low attack complexity, no privileges required beyond low-level access, and no user interaction needed. The impact on confidentiality, integrity, and availability is high due to the ability to manipulate database contents. The issue was addressed and fixed in ChurchCRM version 6.5.3. No public exploits have been reported yet, but the vulnerability poses a significant risk to unpatched systems.
Potential Impact
For European organizations using ChurchCRM, this vulnerability could lead to severe consequences including unauthorized disclosure of sensitive personal data of church members, manipulation or deletion of critical records, and disruption of church management operations. Given that ChurchCRM is used to manage community and member information, exploitation could result in privacy violations under GDPR, leading to regulatory penalties and reputational damage. The ability to execute arbitrary SQL commands could also allow attackers to pivot within the network or escalate privileges if the database contains credentials or other sensitive configuration data. The lack of required user interaction and low privilege requirements increase the likelihood of exploitation in environments where ChurchCRM is accessible over the network. This threat is particularly relevant for religious organizations, charities, and community groups that rely on ChurchCRM for operational continuity and data management.
Mitigation Recommendations
European organizations should immediately upgrade ChurchCRM installations to version 6.5.3 or later to remediate this vulnerability. Until patching is possible, organizations should restrict network access to the ChurchCRM application, limiting it to trusted internal users and IP addresses. Implementing Web Application Firewalls (WAFs) with rules to detect and block SQL injection patterns targeting the PersonAddress parameter can provide temporary protection. Conduct thorough input validation and sanitization on all user-supplied data, especially POST parameters, to prevent injection attacks. Regularly audit and monitor database logs for unusual queries or access patterns indicative of exploitation attempts. Additionally, organizations should review and enforce the principle of least privilege on database accounts used by ChurchCRM to minimize potential damage. Finally, ensure backups of ChurchCRM data are current and tested for recovery to mitigate data loss risks.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-67877: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ChurchCRM CRM
Description
ChurchCRM is an open-source church management system. Versions prior to 6.5.3 have a SQL injection vulnerability in the `src/CartToFamily.php` file, specifically in how the `PersonAddress` POST parameter is handled. Unlike other parameters in the same file which are correctly cast to integers using the `InputUtils` class, the `PersonAddress` parameter is missing the type definition. This allows an attacker to inject arbitrary SQL commands directly into the query. Version 6.5.3 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-67877 is a SQL injection vulnerability classified under CWE-89, found in the open-source ChurchCRM church management system. The vulnerability arises from improper input validation in the src/CartToFamily.php file, specifically in the handling of the PersonAddress POST parameter. Unlike other parameters that are cast to integers using the InputUtils class, PersonAddress lacks this type enforcement, allowing malicious actors to inject specially crafted SQL payloads directly into backend queries. This flaw enables attackers to execute arbitrary SQL commands, potentially leading to unauthorized data access, data modification, or deletion within the ChurchCRM database. The vulnerability has a CVSS 4.0 base score of 7.4, indicating high severity, with attack vector being network-based, low attack complexity, no privileges required beyond low-level access, and no user interaction needed. The impact on confidentiality, integrity, and availability is high due to the ability to manipulate database contents. The issue was addressed and fixed in ChurchCRM version 6.5.3. No public exploits have been reported yet, but the vulnerability poses a significant risk to unpatched systems.
Potential Impact
For European organizations using ChurchCRM, this vulnerability could lead to severe consequences including unauthorized disclosure of sensitive personal data of church members, manipulation or deletion of critical records, and disruption of church management operations. Given that ChurchCRM is used to manage community and member information, exploitation could result in privacy violations under GDPR, leading to regulatory penalties and reputational damage. The ability to execute arbitrary SQL commands could also allow attackers to pivot within the network or escalate privileges if the database contains credentials or other sensitive configuration data. The lack of required user interaction and low privilege requirements increase the likelihood of exploitation in environments where ChurchCRM is accessible over the network. This threat is particularly relevant for religious organizations, charities, and community groups that rely on ChurchCRM for operational continuity and data management.
Mitigation Recommendations
European organizations should immediately upgrade ChurchCRM installations to version 6.5.3 or later to remediate this vulnerability. Until patching is possible, organizations should restrict network access to the ChurchCRM application, limiting it to trusted internal users and IP addresses. Implementing Web Application Firewalls (WAFs) with rules to detect and block SQL injection patterns targeting the PersonAddress parameter can provide temporary protection. Conduct thorough input validation and sanitization on all user-supplied data, especially POST parameters, to prevent injection attacks. Regularly audit and monitor database logs for unusual queries or access patterns indicative of exploitation attempts. Additionally, organizations should review and enforce the principle of least privilege on database accounts used by ChurchCRM to minimize potential damage. Finally, ensure backups of ChurchCRM data are current and tested for recovery to mitigate data loss risks.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-12T18:53:03.237Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6943229bfab815a9fc1fb3e0
Added to database: 12/17/2025, 9:37:31 PM
Last enriched: 12/17/2025, 9:52:19 PM
Last updated: 12/18/2025, 8:10:32 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14318: CWE-863 Incorrect Authorization in M-Files Corporation M-Files Server
MediumCVE-2025-6326: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in AncoraThemes Inset
HighCVE-2025-6324: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MatrixAddons Easy Invoice
HighCVE-2025-67546: Exposure of Sensitive System Information to an Unauthorized Control Sphere in weDevs WP ERP
HighCVE-2025-66119: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Bob Hostel
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.