CVE-2025-68399: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ChurchCRM CRM
ChurchCRM is an open-source church management system. In versions prior to 6.5.4, there is a Stored Cross-Site Scripting (XSS) vulnerability within the GroupEditor.php page of the application. When a user attempts to create a group role, they can execute malicious JavaScript. However, for this to work, the user must have permission to view and modify groups in the application. Version 6.5.4 fixes the issue.
AI Analysis
Technical Summary
CVE-2025-68399 identifies a stored Cross-Site Scripting (XSS) vulnerability in the open-source ChurchCRM application, a church management system widely used for managing congregational data. The vulnerability exists in versions prior to 6.5.4 within the GroupEditor.php page, where the application fails to properly neutralize user input during web page generation. Specifically, when a user with permissions to view and modify groups creates a group role, they can inject malicious JavaScript code that is stored and later executed in the context of other users viewing the affected page. This stored XSS flaw arises from improper input sanitization, categorized under CWE-79. The CVSS 4.0 base score is 2.0, reflecting low severity due to the requirement for authenticated privileges (PR:L), no user interaction needed for exploitation (UI:P), and limited impact on confidentiality, integrity, and availability. The vulnerability does not allow privilege escalation or direct data exfiltration but could be leveraged for session hijacking or defacement if exploited. No known exploits have been reported in the wild, and the vendor addressed the issue in ChurchCRM version 6.5.4 by implementing proper input validation and output encoding. Organizations using affected versions should prioritize upgrading to eliminate this risk.
Potential Impact
For European organizations using ChurchCRM, this vulnerability poses a limited but tangible risk. The primary impact is the potential execution of malicious scripts within the browser of users who have access to the group management interface, which could lead to session hijacking, unauthorized actions performed on behalf of users, or defacement of the application interface. However, the requirement that an attacker must have permissions to modify groups restricts exploitation to trusted insiders or compromised accounts. The low CVSS score reflects the limited scope and impact. Nevertheless, organizations with sensitive church management data or those subject to strict data protection regulations (e.g., GDPR) should consider the risk of unauthorized access or manipulation of user sessions as a compliance concern. The vulnerability could also be used as a foothold for further attacks if combined with other vulnerabilities or social engineering. The absence of known exploits reduces immediate risk but does not eliminate the need for remediation.
Mitigation Recommendations
The primary mitigation is to upgrade ChurchCRM to version 6.5.4 or later, where the vulnerability is patched. Organizations should implement strict access controls to limit the number of users who have permissions to view and modify groups, reducing the attack surface. Conduct regular audits of user roles and permissions to ensure that only necessary personnel have elevated privileges. Employ web application firewalls (WAFs) with rules to detect and block common XSS payloads targeting the GroupEditor.php endpoint. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the application context. Educate administrators and users with elevated privileges about the risks of XSS and safe handling of input fields. Finally, monitor logs for suspicious activity related to group role creation or modification to detect potential exploitation attempts.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Ireland
CVE-2025-68399: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ChurchCRM CRM
Description
ChurchCRM is an open-source church management system. In versions prior to 6.5.4, there is a Stored Cross-Site Scripting (XSS) vulnerability within the GroupEditor.php page of the application. When a user attempts to create a group role, they can execute malicious JavaScript. However, for this to work, the user must have permission to view and modify groups in the application. Version 6.5.4 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-68399 identifies a stored Cross-Site Scripting (XSS) vulnerability in the open-source ChurchCRM application, a church management system widely used for managing congregational data. The vulnerability exists in versions prior to 6.5.4 within the GroupEditor.php page, where the application fails to properly neutralize user input during web page generation. Specifically, when a user with permissions to view and modify groups creates a group role, they can inject malicious JavaScript code that is stored and later executed in the context of other users viewing the affected page. This stored XSS flaw arises from improper input sanitization, categorized under CWE-79. The CVSS 4.0 base score is 2.0, reflecting low severity due to the requirement for authenticated privileges (PR:L), no user interaction needed for exploitation (UI:P), and limited impact on confidentiality, integrity, and availability. The vulnerability does not allow privilege escalation or direct data exfiltration but could be leveraged for session hijacking or defacement if exploited. No known exploits have been reported in the wild, and the vendor addressed the issue in ChurchCRM version 6.5.4 by implementing proper input validation and output encoding. Organizations using affected versions should prioritize upgrading to eliminate this risk.
Potential Impact
For European organizations using ChurchCRM, this vulnerability poses a limited but tangible risk. The primary impact is the potential execution of malicious scripts within the browser of users who have access to the group management interface, which could lead to session hijacking, unauthorized actions performed on behalf of users, or defacement of the application interface. However, the requirement that an attacker must have permissions to modify groups restricts exploitation to trusted insiders or compromised accounts. The low CVSS score reflects the limited scope and impact. Nevertheless, organizations with sensitive church management data or those subject to strict data protection regulations (e.g., GDPR) should consider the risk of unauthorized access or manipulation of user sessions as a compliance concern. The vulnerability could also be used as a foothold for further attacks if combined with other vulnerabilities or social engineering. The absence of known exploits reduces immediate risk but does not eliminate the need for remediation.
Mitigation Recommendations
The primary mitigation is to upgrade ChurchCRM to version 6.5.4 or later, where the vulnerability is patched. Organizations should implement strict access controls to limit the number of users who have permissions to view and modify groups, reducing the attack surface. Conduct regular audits of user roles and permissions to ensure that only necessary personnel have elevated privileges. Employ web application firewalls (WAFs) with rules to detect and block common XSS payloads targeting the GroupEditor.php endpoint. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the application context. Educate administrators and users with elevated privileges about the risks of XSS and safe handling of input fields. Finally, monitor logs for suspicious activity related to group role creation or modification to detect potential exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-16T21:59:48.534Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6943260ffab815a9fc251853
Added to database: 12/17/2025, 9:52:15 PM
Last enriched: 12/17/2025, 10:07:52 PM
Last updated: 12/18/2025, 7:22:32 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-68459: Improper neutralization of special elements used in an OS command ('OS Command Injection') in Ruijie Networks Co., Ltd. AP180-PE V3.xx
HighCVE-2025-47387: CWE-822 Untrusted Pointer Dereference in Qualcomm, Inc. Snapdragon
HighCVE-2025-47382: CWE-863: Incorrect Authorization in Qualcomm, Inc. Snapdragon
HighCVE-2025-47372: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon
CriticalCVE-2025-47350: CWE-416 Use After Free in Qualcomm, Inc. Snapdragon
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.