CVE-2025-68112: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ChurchCRM CRM
ChurchCRM is an open-source church management system. In versions prior to 6.5.3, a SQL injection vulnerability in ChurchCRM's Event Attendee Editor allows authenticated users to execute arbitrary SQL commands, leading to complete database compromise, administrative credential theft, and potential system takeover. The vulnerability enables attackers to extract sensitive member data, authentication credentials, and financial information from the church management system. Version 6.5.3 contains a patch for the issue.
AI Analysis
Technical Summary
CVE-2025-68112 is a high-severity SQL injection vulnerability affecting ChurchCRM, an open-source church management system widely used for managing member data, events, and financial records. The flaw exists in the Event Attendee Editor component in versions prior to 6.5.3, where improper neutralization of special elements in SQL commands allows authenticated users to inject malicious SQL code. This vulnerability falls under CWE-89, indicating improper input sanitization leading to SQL injection. Exploitation requires only authenticated access, which may be obtained by legitimate users or through compromised credentials. Once exploited, attackers can execute arbitrary SQL commands on the backend database, enabling them to extract sensitive data such as member personal information, authentication credentials, and financial details. Furthermore, attackers can manipulate or delete data, escalate privileges by stealing administrative credentials, and potentially take over the entire system. The vulnerability has a CVSS v3.1 base score of 9.6, reflecting its critical impact on confidentiality and integrity with network attack vector, low attack complexity, and no user interaction required. Although no public exploits have been reported yet, the critical nature and ease of exploitation make timely patching essential. The vendor addressed the issue in ChurchCRM version 6.5.3 by implementing proper input validation and sanitization to prevent SQL injection attacks.
Potential Impact
For European organizations using ChurchCRM, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive data, including personal member information and financial records. Exploitation could lead to large-scale data breaches, violating GDPR and other data protection regulations, resulting in legal penalties and reputational damage. Administrative credential theft could allow attackers to gain full control over the CRM system, potentially disrupting church operations and associated services. The exposure of financial data could also lead to fraud or financial loss. Given the critical severity and the network-based attack vector, unpatched systems are highly vulnerable to remote exploitation by insiders or attackers who have obtained user credentials. This threat is particularly impactful for European churches and religious organizations that rely on ChurchCRM for managing sensitive community data and financial transactions.
Mitigation Recommendations
European organizations should immediately upgrade ChurchCRM installations to version 6.5.3 or later, where the vulnerability is patched. Until the upgrade is applied, restrict access to the Event Attendee Editor to trusted and verified users only, and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of credential compromise. Conduct thorough audits of user accounts and permissions to ensure that only necessary personnel have access to sensitive modules. Implement network segmentation and firewall rules to limit access to the CRM system from untrusted networks. Monitor database and application logs for unusual SQL queries or access patterns indicative of exploitation attempts. Regularly back up CRM data securely to enable recovery in case of compromise. Additionally, apply web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the vulnerable endpoints. Finally, educate users about the risks of credential sharing and phishing attacks that could lead to unauthorized access.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2025-68112: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ChurchCRM CRM
Description
ChurchCRM is an open-source church management system. In versions prior to 6.5.3, a SQL injection vulnerability in ChurchCRM's Event Attendee Editor allows authenticated users to execute arbitrary SQL commands, leading to complete database compromise, administrative credential theft, and potential system takeover. The vulnerability enables attackers to extract sensitive member data, authentication credentials, and financial information from the church management system. Version 6.5.3 contains a patch for the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-68112 is a high-severity SQL injection vulnerability affecting ChurchCRM, an open-source church management system widely used for managing member data, events, and financial records. The flaw exists in the Event Attendee Editor component in versions prior to 6.5.3, where improper neutralization of special elements in SQL commands allows authenticated users to inject malicious SQL code. This vulnerability falls under CWE-89, indicating improper input sanitization leading to SQL injection. Exploitation requires only authenticated access, which may be obtained by legitimate users or through compromised credentials. Once exploited, attackers can execute arbitrary SQL commands on the backend database, enabling them to extract sensitive data such as member personal information, authentication credentials, and financial details. Furthermore, attackers can manipulate or delete data, escalate privileges by stealing administrative credentials, and potentially take over the entire system. The vulnerability has a CVSS v3.1 base score of 9.6, reflecting its critical impact on confidentiality and integrity with network attack vector, low attack complexity, and no user interaction required. Although no public exploits have been reported yet, the critical nature and ease of exploitation make timely patching essential. The vendor addressed the issue in ChurchCRM version 6.5.3 by implementing proper input validation and sanitization to prevent SQL injection attacks.
Potential Impact
For European organizations using ChurchCRM, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive data, including personal member information and financial records. Exploitation could lead to large-scale data breaches, violating GDPR and other data protection regulations, resulting in legal penalties and reputational damage. Administrative credential theft could allow attackers to gain full control over the CRM system, potentially disrupting church operations and associated services. The exposure of financial data could also lead to fraud or financial loss. Given the critical severity and the network-based attack vector, unpatched systems are highly vulnerable to remote exploitation by insiders or attackers who have obtained user credentials. This threat is particularly impactful for European churches and religious organizations that rely on ChurchCRM for managing sensitive community data and financial transactions.
Mitigation Recommendations
European organizations should immediately upgrade ChurchCRM installations to version 6.5.3 or later, where the vulnerability is patched. Until the upgrade is applied, restrict access to the Event Attendee Editor to trusted and verified users only, and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of credential compromise. Conduct thorough audits of user accounts and permissions to ensure that only necessary personnel have access to sensitive modules. Implement network segmentation and firewall rules to limit access to the CRM system from untrusted networks. Monitor database and application logs for unusual SQL queries or access patterns indicative of exploitation attempts. Regularly back up CRM data securely to enable recovery in case of compromise. Additionally, apply web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the vulnerable endpoints. Finally, educate users about the risks of credential sharing and phishing attacks that could lead to unauthorized access.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-15T14:44:59.221Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6943260ffab815a9fc251850
Added to database: 12/17/2025, 9:52:15 PM
Last enriched: 12/17/2025, 10:07:06 PM
Last updated: 12/18/2025, 7:21:40 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-68459: Improper neutralization of special elements used in an OS command ('OS Command Injection') in Ruijie Networks Co., Ltd. AP180-PE V3.xx
HighCVE-2025-47387: CWE-822 Untrusted Pointer Dereference in Qualcomm, Inc. Snapdragon
HighCVE-2025-47382: CWE-863: Incorrect Authorization in Qualcomm, Inc. Snapdragon
HighCVE-2025-47372: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon
CriticalCVE-2025-47350: CWE-416 Use After Free in Qualcomm, Inc. Snapdragon
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.