CVE-2025-68399: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ChurchCRM CRM
ChurchCRM is an open-source church management system. In versions prior to 6.5.4, there is a Stored Cross-Site Scripting (XSS) vulnerability within the GroupEditor.php page of the application. When a user attempts to create a group role, they can execute malicious JavaScript. However, for this to work, the user must have permission to view and modify groups in the application. Version 6.5.4 fixes the issue.
AI Analysis
Technical Summary
ChurchCRM, an open-source church management system, suffers from a stored Cross-Site Scripting (XSS) vulnerability identified as CVE-2025-68399 and classified under CWE-79. This vulnerability exists in versions prior to 6.5.4 within the GroupEditor.php page, where input sanitization is insufficient during web page generation. Specifically, when a user with permissions to view and modify groups creates a group role, they can inject malicious JavaScript code that is stored and later executed in the context of other users viewing the affected page. The vulnerability requires the attacker to have authenticated access with group modification privileges, and some user interaction is necessary to trigger the malicious script. The CVSS 4.0 base score is 2.0, reflecting low severity due to the limited scope and required privileges. No known exploits have been reported in the wild. The vulnerability is resolved in ChurchCRM version 6.5.4 by properly neutralizing input to prevent script injection.
Potential Impact
For European organizations using ChurchCRM, this vulnerability could lead to unauthorized script execution within the application context, potentially allowing attackers to steal session tokens, perform actions on behalf of legitimate users, or conduct phishing attacks targeting users with group modification privileges. Although the impact is limited by the need for authenticated access and specific permissions, exploitation could compromise the integrity and confidentiality of user data and organizational workflows. Given that ChurchCRM is used primarily by churches and religious organizations, the impact may be more pronounced in communities relying heavily on this software for member management and communication. The low CVSS score and absence of known exploits suggest limited immediate risk, but unpatched instances remain vulnerable to insider threats or targeted attacks.
Mitigation Recommendations
European organizations should immediately upgrade ChurchCRM installations to version 6.5.4 or later to remediate the vulnerability. Until the upgrade is applied, restrict group modification permissions strictly to trusted users and monitor for unusual activity involving group role creation. Implement web application firewalls (WAFs) with rules to detect and block common XSS payloads targeting the GroupEditor.php endpoint. Conduct regular security audits and user permission reviews to minimize the attack surface. Educate users with elevated privileges about the risks of XSS and the importance of cautious input handling. Additionally, consider implementing Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks by restricting script execution sources.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands, Belgium, Sweden, Poland
CVE-2025-68399: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ChurchCRM CRM
Description
ChurchCRM is an open-source church management system. In versions prior to 6.5.4, there is a Stored Cross-Site Scripting (XSS) vulnerability within the GroupEditor.php page of the application. When a user attempts to create a group role, they can execute malicious JavaScript. However, for this to work, the user must have permission to view and modify groups in the application. Version 6.5.4 fixes the issue.
AI-Powered Analysis
Technical Analysis
ChurchCRM, an open-source church management system, suffers from a stored Cross-Site Scripting (XSS) vulnerability identified as CVE-2025-68399 and classified under CWE-79. This vulnerability exists in versions prior to 6.5.4 within the GroupEditor.php page, where input sanitization is insufficient during web page generation. Specifically, when a user with permissions to view and modify groups creates a group role, they can inject malicious JavaScript code that is stored and later executed in the context of other users viewing the affected page. The vulnerability requires the attacker to have authenticated access with group modification privileges, and some user interaction is necessary to trigger the malicious script. The CVSS 4.0 base score is 2.0, reflecting low severity due to the limited scope and required privileges. No known exploits have been reported in the wild. The vulnerability is resolved in ChurchCRM version 6.5.4 by properly neutralizing input to prevent script injection.
Potential Impact
For European organizations using ChurchCRM, this vulnerability could lead to unauthorized script execution within the application context, potentially allowing attackers to steal session tokens, perform actions on behalf of legitimate users, or conduct phishing attacks targeting users with group modification privileges. Although the impact is limited by the need for authenticated access and specific permissions, exploitation could compromise the integrity and confidentiality of user data and organizational workflows. Given that ChurchCRM is used primarily by churches and religious organizations, the impact may be more pronounced in communities relying heavily on this software for member management and communication. The low CVSS score and absence of known exploits suggest limited immediate risk, but unpatched instances remain vulnerable to insider threats or targeted attacks.
Mitigation Recommendations
European organizations should immediately upgrade ChurchCRM installations to version 6.5.4 or later to remediate the vulnerability. Until the upgrade is applied, restrict group modification permissions strictly to trusted users and monitor for unusual activity involving group role creation. Implement web application firewalls (WAFs) with rules to detect and block common XSS payloads targeting the GroupEditor.php endpoint. Conduct regular security audits and user permission reviews to minimize the attack surface. Educate users with elevated privileges about the risks of XSS and the importance of cautious input handling. Additionally, consider implementing Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks by restricting script execution sources.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-16T21:59:48.534Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6943260ffab815a9fc251853
Added to database: 12/17/2025, 9:52:15 PM
Last enriched: 12/24/2025, 10:56:24 PM
Last updated: 2/4/2026, 1:52:02 PM
Views: 55
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-35280: Execute unauthorized code or commands in Fortinet FortiDeceptor
MediumCVE-2025-5329: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Martcode Software Inc. Delta Course Automation
CriticalCVE-2025-15368: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in themeboy SportsPress – Sports Club & League Manager
HighCVE-2025-59818: Vulnerability in Zenitel TCIS-3+
CriticalCVE-2025-41085: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Apidog Apidog Web Platform
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.