CVE-2025-68112: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ChurchCRM CRM
ChurchCRM is an open-source church management system. In versions prior to 6.5.3, a SQL injection vulnerability in ChurchCRM's Event Attendee Editor allows authenticated users to execute arbitrary SQL commands, leading to complete database compromise, administrative credential theft, and potential system takeover. The vulnerability enables attackers to extract sensitive member data, authentication credentials, and financial information from the church management system. Version 6.5.3 contains a patch for the issue.
AI Analysis
Technical Summary
CVE-2025-68112 is a critical SQL injection vulnerability identified in the ChurchCRM open-source church management system, specifically affecting versions prior to 6.5.3. The flaw resides in the Event Attendee Editor component, where improper neutralization of special elements in SQL commands allows authenticated users to inject arbitrary SQL code. This vulnerability is classified under CWE-89, indicating improper input sanitization leading to SQL injection. Exploiting this vulnerability enables attackers to execute arbitrary SQL queries on the backend database, which can lead to complete compromise of the database contents, including sensitive member information, authentication credentials, and financial data managed by the CRM. The attacker can escalate privileges by stealing administrative credentials and potentially take over the entire system. The CVSS v3.1 base score is 9.6, reflecting the high impact on confidentiality and integrity, with network attack vector, low attack complexity, and requiring privileges but no user interaction. The vulnerability scope is changed (S:C), meaning it can affect resources beyond the initially compromised component. Although no known exploits have been reported in the wild, the critical nature and ease of exploitation by authenticated users make this a significant threat. The vendor addressed the issue in ChurchCRM version 6.5.3 by patching the input validation in the Event Attendee Editor to properly neutralize SQL special characters and prevent injection.
Potential Impact
For European organizations using ChurchCRM, this vulnerability poses a severe risk to the confidentiality and integrity of sensitive data, including personal member information and financial records. Churches and religious organizations often hold sensitive personal data protected under GDPR, so a breach could lead to significant regulatory penalties and reputational damage. The ability to steal administrative credentials and potentially take over the system could disrupt organizational operations and lead to further lateral movement within connected networks. Financial fraud or unauthorized access to donation records could also occur. Given that the vulnerability requires authenticated access, insider threats or compromised user accounts increase the risk. The impact extends beyond data loss to potential service disruption and loss of trust within communities served by these organizations.
Mitigation Recommendations
European organizations should immediately upgrade ChurchCRM installations to version 6.5.3 or later, where the vulnerability is patched. Until upgrading, restrict access to the Event Attendee Editor to only highly trusted users and monitor for unusual database queries or access patterns. Implement strong authentication controls, including multi-factor authentication, to reduce the risk of compromised credentials. Regularly audit user privileges to ensure least privilege principles are enforced. Employ web application firewalls (WAFs) with SQL injection detection capabilities to provide an additional layer of defense. Conduct security awareness training for users with access to the CRM to recognize potential phishing or credential theft attempts. Finally, maintain regular backups of CRM data to enable recovery in case of compromise.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Ireland
CVE-2025-68112: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ChurchCRM CRM
Description
ChurchCRM is an open-source church management system. In versions prior to 6.5.3, a SQL injection vulnerability in ChurchCRM's Event Attendee Editor allows authenticated users to execute arbitrary SQL commands, leading to complete database compromise, administrative credential theft, and potential system takeover. The vulnerability enables attackers to extract sensitive member data, authentication credentials, and financial information from the church management system. Version 6.5.3 contains a patch for the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-68112 is a critical SQL injection vulnerability identified in the ChurchCRM open-source church management system, specifically affecting versions prior to 6.5.3. The flaw resides in the Event Attendee Editor component, where improper neutralization of special elements in SQL commands allows authenticated users to inject arbitrary SQL code. This vulnerability is classified under CWE-89, indicating improper input sanitization leading to SQL injection. Exploiting this vulnerability enables attackers to execute arbitrary SQL queries on the backend database, which can lead to complete compromise of the database contents, including sensitive member information, authentication credentials, and financial data managed by the CRM. The attacker can escalate privileges by stealing administrative credentials and potentially take over the entire system. The CVSS v3.1 base score is 9.6, reflecting the high impact on confidentiality and integrity, with network attack vector, low attack complexity, and requiring privileges but no user interaction. The vulnerability scope is changed (S:C), meaning it can affect resources beyond the initially compromised component. Although no known exploits have been reported in the wild, the critical nature and ease of exploitation by authenticated users make this a significant threat. The vendor addressed the issue in ChurchCRM version 6.5.3 by patching the input validation in the Event Attendee Editor to properly neutralize SQL special characters and prevent injection.
Potential Impact
For European organizations using ChurchCRM, this vulnerability poses a severe risk to the confidentiality and integrity of sensitive data, including personal member information and financial records. Churches and religious organizations often hold sensitive personal data protected under GDPR, so a breach could lead to significant regulatory penalties and reputational damage. The ability to steal administrative credentials and potentially take over the system could disrupt organizational operations and lead to further lateral movement within connected networks. Financial fraud or unauthorized access to donation records could also occur. Given that the vulnerability requires authenticated access, insider threats or compromised user accounts increase the risk. The impact extends beyond data loss to potential service disruption and loss of trust within communities served by these organizations.
Mitigation Recommendations
European organizations should immediately upgrade ChurchCRM installations to version 6.5.3 or later, where the vulnerability is patched. Until upgrading, restrict access to the Event Attendee Editor to only highly trusted users and monitor for unusual database queries or access patterns. Implement strong authentication controls, including multi-factor authentication, to reduce the risk of compromised credentials. Regularly audit user privileges to ensure least privilege principles are enforced. Employ web application firewalls (WAFs) with SQL injection detection capabilities to provide an additional layer of defense. Conduct security awareness training for users with access to the CRM to recognize potential phishing or credential theft attempts. Finally, maintain regular backups of CRM data to enable recovery in case of compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-15T14:44:59.221Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6943260ffab815a9fc251850
Added to database: 12/17/2025, 9:52:15 PM
Last enriched: 12/24/2025, 10:55:47 PM
Last updated: 2/7/2026, 6:46:41 PM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2106: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2105: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2090: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.