Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68399: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ChurchCRM CRM

0
Low
VulnerabilityCVE-2025-68399cvecve-2025-68399cwe-79
Published: Wed Dec 17 2025 (12/17/2025, 21:40:23 UTC)
Source: CVE Database V5
Vendor/Project: ChurchCRM
Product: CRM

Description

ChurchCRM is an open-source church management system. In versions prior to 6.5.4, there is a Stored Cross-Site Scripting (XSS) vulnerability within the GroupEditor.php page of the application. When a user attempts to create a group role, they can execute malicious JavaScript. However, for this to work, the user must have permission to view and modify groups in the application. Version 6.5.4 fixes the issue.

AI-Powered Analysis

AILast updated: 12/24/2025, 22:56:24 UTC

Technical Analysis

ChurchCRM, an open-source church management system, suffers from a stored Cross-Site Scripting (XSS) vulnerability identified as CVE-2025-68399 and classified under CWE-79. This vulnerability exists in versions prior to 6.5.4 within the GroupEditor.php page, where input sanitization is insufficient during web page generation. Specifically, when a user with permissions to view and modify groups creates a group role, they can inject malicious JavaScript code that is stored and later executed in the context of other users viewing the affected page. The vulnerability requires the attacker to have authenticated access with group modification privileges, and some user interaction is necessary to trigger the malicious script. The CVSS 4.0 base score is 2.0, reflecting low severity due to the limited scope and required privileges. No known exploits have been reported in the wild. The vulnerability is resolved in ChurchCRM version 6.5.4 by properly neutralizing input to prevent script injection.

Potential Impact

For European organizations using ChurchCRM, this vulnerability could lead to unauthorized script execution within the application context, potentially allowing attackers to steal session tokens, perform actions on behalf of legitimate users, or conduct phishing attacks targeting users with group modification privileges. Although the impact is limited by the need for authenticated access and specific permissions, exploitation could compromise the integrity and confidentiality of user data and organizational workflows. Given that ChurchCRM is used primarily by churches and religious organizations, the impact may be more pronounced in communities relying heavily on this software for member management and communication. The low CVSS score and absence of known exploits suggest limited immediate risk, but unpatched instances remain vulnerable to insider threats or targeted attacks.

Mitigation Recommendations

European organizations should immediately upgrade ChurchCRM installations to version 6.5.4 or later to remediate the vulnerability. Until the upgrade is applied, restrict group modification permissions strictly to trusted users and monitor for unusual activity involving group role creation. Implement web application firewalls (WAFs) with rules to detect and block common XSS payloads targeting the GroupEditor.php endpoint. Conduct regular security audits and user permission reviews to minimize the attack surface. Educate users with elevated privileges about the risks of XSS and the importance of cautious input handling. Additionally, consider implementing Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks by restricting script execution sources.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-16T21:59:48.534Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6943260ffab815a9fc251853

Added to database: 12/17/2025, 9:52:15 PM

Last enriched: 12/24/2025, 10:56:24 PM

Last updated: 2/4/2026, 1:52:02 PM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats