CVE-2025-68109: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ChurchCRM CRM
ChurchCRM is an open-source church management system. In versions prior to 6.5.3, the Database Restore functionality does not validate the content or file extension of uploaded files. As a result, an attacker can upload a web shell file and subsequently upload a .htaccess file to enable direct access to it. Once accessed, the uploaded web shell allows remote code execution (RCE) on the server. Version 6.5.3 fixes the issue.
AI Analysis
Technical Summary
CVE-2025-68109 affects ChurchCRM, an open-source church management system, specifically versions before 6.5.3. The vulnerability arises from improper validation in the Database Restore feature, which allows authenticated users to upload arbitrary files without checking file content or extension. Attackers can exploit this by uploading a malicious web shell file followed by a .htaccess file to enable direct web access to the shell. Once accessed, the web shell grants remote code execution (RCE) capabilities on the server, allowing attackers to execute arbitrary OS commands. This vulnerability is categorized under multiple CWEs including CWE-78 (OS Command Injection), CWE-434 (Unrestricted Upload of File with Dangerous Type), CWE-494 (Download of Code Without Integrity Check), CWE-552 (Files or Directories Accessible to External Parties), and CWE-915 (Improperly Controlled Modification of Dynamically-Determined Object Attributes). The CVSS v3.1 score of 9.1 reflects a critical severity with network attack vector, low attack complexity, high privileges required, no user interaction, and complete impact on confidentiality, integrity, and availability. Although no exploits have been observed in the wild yet, the vulnerability poses a significant risk to affected installations. The fix was introduced in ChurchCRM version 6.5.3, which implements proper validation and restrictions on file uploads to prevent such abuse.
Potential Impact
For European organizations using ChurchCRM, this vulnerability could lead to full system compromise of the CRM server. Attackers gaining RCE can exfiltrate sensitive personal and organizational data, modify or delete records, disrupt church operations, and potentially pivot to other internal systems. The impact extends to confidentiality breaches of member information, integrity loss of critical data, and availability disruption of church management services. Given the sensitive nature of data managed by ChurchCRM (personal details, donation records, event information), exploitation could result in reputational damage and legal consequences under GDPR. Organizations relying on ChurchCRM servers exposed to the internet or insufficiently segmented networks are particularly vulnerable. The requirement for high privileges limits exploitation to insiders or compromised accounts but does not eliminate risk, especially if credential theft or phishing occurs. The lack of known exploits in the wild suggests a window for proactive patching and mitigation before widespread attacks emerge.
Mitigation Recommendations
European organizations should immediately upgrade ChurchCRM installations to version 6.5.3 or later to apply the official patch. Until upgraded, restrict access to the Database Restore functionality to the minimum number of trusted administrators and enforce strong authentication mechanisms such as multi-factor authentication. Implement strict file upload validation at the web server and application layers, including whitelisting allowed file types and scanning uploads for malicious content. Disable or tightly control the use of .htaccess files to prevent enabling unauthorized script execution. Monitor web server logs and file directories for unusual uploads or access patterns indicative of web shell deployment. Employ network segmentation to isolate ChurchCRM servers from critical infrastructure and limit outbound connections to reduce attacker lateral movement. Regularly audit user privileges and revoke unnecessary administrative rights. Consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious file upload attempts and command injection payloads. Finally, maintain up-to-date backups and test restore procedures to recover quickly from potential compromises.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Ireland
CVE-2025-68109: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ChurchCRM CRM
Description
ChurchCRM is an open-source church management system. In versions prior to 6.5.3, the Database Restore functionality does not validate the content or file extension of uploaded files. As a result, an attacker can upload a web shell file and subsequently upload a .htaccess file to enable direct access to it. Once accessed, the uploaded web shell allows remote code execution (RCE) on the server. Version 6.5.3 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-68109 affects ChurchCRM, an open-source church management system, specifically versions before 6.5.3. The vulnerability arises from improper validation in the Database Restore feature, which allows authenticated users to upload arbitrary files without checking file content or extension. Attackers can exploit this by uploading a malicious web shell file followed by a .htaccess file to enable direct web access to the shell. Once accessed, the web shell grants remote code execution (RCE) capabilities on the server, allowing attackers to execute arbitrary OS commands. This vulnerability is categorized under multiple CWEs including CWE-78 (OS Command Injection), CWE-434 (Unrestricted Upload of File with Dangerous Type), CWE-494 (Download of Code Without Integrity Check), CWE-552 (Files or Directories Accessible to External Parties), and CWE-915 (Improperly Controlled Modification of Dynamically-Determined Object Attributes). The CVSS v3.1 score of 9.1 reflects a critical severity with network attack vector, low attack complexity, high privileges required, no user interaction, and complete impact on confidentiality, integrity, and availability. Although no exploits have been observed in the wild yet, the vulnerability poses a significant risk to affected installations. The fix was introduced in ChurchCRM version 6.5.3, which implements proper validation and restrictions on file uploads to prevent such abuse.
Potential Impact
For European organizations using ChurchCRM, this vulnerability could lead to full system compromise of the CRM server. Attackers gaining RCE can exfiltrate sensitive personal and organizational data, modify or delete records, disrupt church operations, and potentially pivot to other internal systems. The impact extends to confidentiality breaches of member information, integrity loss of critical data, and availability disruption of church management services. Given the sensitive nature of data managed by ChurchCRM (personal details, donation records, event information), exploitation could result in reputational damage and legal consequences under GDPR. Organizations relying on ChurchCRM servers exposed to the internet or insufficiently segmented networks are particularly vulnerable. The requirement for high privileges limits exploitation to insiders or compromised accounts but does not eliminate risk, especially if credential theft or phishing occurs. The lack of known exploits in the wild suggests a window for proactive patching and mitigation before widespread attacks emerge.
Mitigation Recommendations
European organizations should immediately upgrade ChurchCRM installations to version 6.5.3 or later to apply the official patch. Until upgraded, restrict access to the Database Restore functionality to the minimum number of trusted administrators and enforce strong authentication mechanisms such as multi-factor authentication. Implement strict file upload validation at the web server and application layers, including whitelisting allowed file types and scanning uploads for malicious content. Disable or tightly control the use of .htaccess files to prevent enabling unauthorized script execution. Monitor web server logs and file directories for unusual uploads or access patterns indicative of web shell deployment. Employ network segmentation to isolate ChurchCRM servers from critical infrastructure and limit outbound connections to reduce attacker lateral movement. Regularly audit user privileges and revoke unnecessary administrative rights. Consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious file upload attempts and command injection payloads. Finally, maintain up-to-date backups and test restore procedures to recover quickly from potential compromises.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-15T14:44:59.220Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6943229bfab815a9fc1fb3e3
Added to database: 12/17/2025, 9:37:31 PM
Last enriched: 12/17/2025, 9:52:07 PM
Last updated: 12/18/2025, 8:10:06 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14318: CWE-863 Incorrect Authorization in M-Files Corporation M-Files Server
MediumCVE-2025-6326: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in AncoraThemes Inset
HighCVE-2025-6324: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MatrixAddons Easy Invoice
HighCVE-2025-67546: Exposure of Sensitive System Information to an Unauthorized Control Sphere in weDevs WP ERP
HighCVE-2025-66119: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Bob Hostel
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.