Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68400: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ChurchCRM CRM

0
Critical
VulnerabilityCVE-2025-68400cvecve-2025-68400cwe-89
Published: Wed Dec 17 2025 (12/17/2025, 21:42:21 UTC)
Source: CVE Database V5
Vendor/Project: ChurchCRM
Product: CRM

Description

ChurchCRM is an open-source church management system. A SQL Injection vulnerability exists in the legacy endpoint `/Reports/ConfirmReportEmail.php` in ChurchCRM prior to version 6.5.3. Although the feature was removed from the UI, the file remains deployed and reachable directly via URL. This is a classic case of *dead but reachable code*. Any authenticated user - including one with zero assigned permissions - can exploit SQL injection through the `familyId` parameter. Version 6.5.3 fixes the issue.

AI-Powered Analysis

AILast updated: 12/24/2025, 22:56:40 UTC

Technical Analysis

CVE-2025-68400 is a critical SQL Injection vulnerability identified in the ChurchCRM open-source church management system. The flaw resides in the legacy endpoint `/Reports/ConfirmReportEmail.php`, which, despite being removed from the user interface in recent versions, remains accessible directly via URL. This endpoint improperly neutralizes special elements in the `familyId` parameter, allowing an attacker to inject malicious SQL commands. Notably, exploitation requires only authentication, but no specific permissions or user interaction, making it highly accessible to any authenticated user, including those with zero assigned privileges. The vulnerability affects all ChurchCRM versions prior to 6.5.3, which contains the patch that removes or secures this endpoint. The CVSS 4.0 base score is 9.3, reflecting critical severity due to network attack vector, low attack complexity, no privileges required, and no user interaction needed, combined with high impact on confidentiality, integrity, and availability of the database. The vulnerability is a classic example of 'dead but reachable code,' where legacy functionality remains exposed, increasing the attack surface. Although no public exploits have been reported yet, the ease of exploitation and potential damage to sensitive church member data and operational integrity make this a significant threat. Organizations relying on ChurchCRM for managing sensitive personal and organizational data must prioritize patching or mitigating this vulnerability immediately.

Potential Impact

The impact of CVE-2025-68400 on European organizations using ChurchCRM can be severe. Exploitation allows attackers to perform arbitrary SQL commands, potentially leading to unauthorized data disclosure, data modification, or deletion. This compromises the confidentiality, integrity, and availability of sensitive church member information and organizational records. Given that any authenticated user can exploit this vulnerability without needing elevated permissions, insider threats or compromised low-privilege accounts pose a significant risk. The disruption or manipulation of church management data can affect operational continuity, trust, and compliance with data protection regulations such as GDPR. Additionally, exploitation could serve as a foothold for further network compromise. European organizations with limited cybersecurity resources or those unaware of the legacy endpoint's existence are particularly vulnerable. The critical CVSS score underscores the urgency of addressing this vulnerability to prevent potentially catastrophic data breaches or service outages.

Mitigation Recommendations

To mitigate CVE-2025-68400, European organizations should immediately upgrade ChurchCRM to version 6.5.3 or later, where the vulnerable endpoint is removed or secured. If immediate upgrading is not feasible, organizations should implement strict access controls to restrict access to the `/Reports/ConfirmReportEmail.php` endpoint, such as web application firewall (WAF) rules blocking requests to this URL or IP-based restrictions limiting access to trusted administrators only. Conduct thorough audits to identify any legacy or unused endpoints exposed on the web server and remove or disable them. Implement robust authentication and monitoring to detect anomalous activities from authenticated users, especially those with minimal permissions. Regularly review and sanitize all user inputs in custom or legacy code to prevent injection flaws. Additionally, organizations should perform database activity monitoring to detect suspicious queries indicative of SQL injection attempts. Finally, ensure that backups of critical data are maintained securely to enable recovery in case of data integrity compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-16T21:59:48.534Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6943260ffab815a9fc251847

Added to database: 12/17/2025, 9:52:15 PM

Last enriched: 12/24/2025, 10:56:40 PM

Last updated: 2/5/2026, 8:22:10 AM

Views: 126

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats