Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68112: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ChurchCRM CRM

0
Critical
VulnerabilityCVE-2025-68112cvecve-2025-68112cwe-89
Published: Wed Dec 17 2025 (12/17/2025, 21:38:24 UTC)
Source: CVE Database V5
Vendor/Project: ChurchCRM
Product: CRM

Description

ChurchCRM is an open-source church management system. In versions prior to 6.5.3, a SQL injection vulnerability in ChurchCRM's Event Attendee Editor allows authenticated users to execute arbitrary SQL commands, leading to complete database compromise, administrative credential theft, and potential system takeover. The vulnerability enables attackers to extract sensitive member data, authentication credentials, and financial information from the church management system. Version 6.5.3 contains a patch for the issue.

AI-Powered Analysis

AILast updated: 12/17/2025, 22:07:06 UTC

Technical Analysis

CVE-2025-68112 is a high-severity SQL injection vulnerability affecting ChurchCRM, an open-source church management system widely used for managing member data, events, and financial records. The flaw exists in the Event Attendee Editor component in versions prior to 6.5.3, where improper neutralization of special elements in SQL commands allows authenticated users to inject malicious SQL code. This vulnerability falls under CWE-89, indicating improper input sanitization leading to SQL injection. Exploitation requires only authenticated access, which may be obtained by legitimate users or through compromised credentials. Once exploited, attackers can execute arbitrary SQL commands on the backend database, enabling them to extract sensitive data such as member personal information, authentication credentials, and financial details. Furthermore, attackers can manipulate or delete data, escalate privileges by stealing administrative credentials, and potentially take over the entire system. The vulnerability has a CVSS v3.1 base score of 9.6, reflecting its critical impact on confidentiality and integrity with network attack vector, low attack complexity, and no user interaction required. Although no public exploits have been reported yet, the critical nature and ease of exploitation make timely patching essential. The vendor addressed the issue in ChurchCRM version 6.5.3 by implementing proper input validation and sanitization to prevent SQL injection attacks.

Potential Impact

For European organizations using ChurchCRM, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive data, including personal member information and financial records. Exploitation could lead to large-scale data breaches, violating GDPR and other data protection regulations, resulting in legal penalties and reputational damage. Administrative credential theft could allow attackers to gain full control over the CRM system, potentially disrupting church operations and associated services. The exposure of financial data could also lead to fraud or financial loss. Given the critical severity and the network-based attack vector, unpatched systems are highly vulnerable to remote exploitation by insiders or attackers who have obtained user credentials. This threat is particularly impactful for European churches and religious organizations that rely on ChurchCRM for managing sensitive community data and financial transactions.

Mitigation Recommendations

European organizations should immediately upgrade ChurchCRM installations to version 6.5.3 or later, where the vulnerability is patched. Until the upgrade is applied, restrict access to the Event Attendee Editor to trusted and verified users only, and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of credential compromise. Conduct thorough audits of user accounts and permissions to ensure that only necessary personnel have access to sensitive modules. Implement network segmentation and firewall rules to limit access to the CRM system from untrusted networks. Monitor database and application logs for unusual SQL queries or access patterns indicative of exploitation attempts. Regularly back up CRM data securely to enable recovery in case of compromise. Additionally, apply web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the vulnerable endpoints. Finally, educate users about the risks of credential sharing and phishing attacks that could lead to unauthorized access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-15T14:44:59.221Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6943260ffab815a9fc251850

Added to database: 12/17/2025, 9:52:15 PM

Last enriched: 12/17/2025, 10:07:06 PM

Last updated: 12/18/2025, 7:21:40 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats