CVE-2025-7829: SQL Injection in code-projects Church Donation System
A vulnerability was found in code-projects Church Donation System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /login.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7829 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Church Donation System, specifically within the /login.php file. The vulnerability arises from improper sanitization or validation of the 'Username' parameter, which allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the database. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no known exploits are currently reported in the wild. The CVSS 4.0 base score is 6.9, indicating a medium severity level, reflecting the network attack vector, low complexity, no privileges or user interaction needed, and limited impact on confidentiality, integrity, and availability. However, the critical classification by the vendor suggests that the impact could be significant depending on the deployment context and data sensitivity. Since the vulnerability affects the login functionality, it could be leveraged to bypass authentication or extract sensitive user credentials and donation records, posing a serious threat to organizations relying on this system for financial transactions and donor management.
Potential Impact
For European organizations using the Church Donation System 1.0, this vulnerability poses a substantial risk to the confidentiality and integrity of donor data and financial information. Exploitation could lead to unauthorized access to personal and payment data, potentially violating GDPR requirements and resulting in legal and reputational consequences. The ability to manipulate login credentials could allow attackers to impersonate legitimate users or administrators, leading to fraudulent transactions or data tampering. Additionally, disruption of donation processing could impact the operational availability of charitable organizations, undermining trust and financial stability. Given the public disclosure and ease of remote exploitation, European non-profits and religious institutions using this software must consider the threat serious, especially as donation systems often contain sensitive donor information and financial records critical to organizational operations.
Mitigation Recommendations
Immediate mitigation should focus on applying patches or updates from the vendor once available. In the absence of an official patch, organizations should implement input validation and parameterized queries or prepared statements to prevent SQL injection on the 'Username' parameter in /login.php. Employing Web Application Firewalls (WAFs) with SQL injection detection and blocking rules can provide interim protection. Conduct thorough code reviews and penetration testing to identify and remediate similar injection points. Restrict database user permissions to the minimum necessary to limit the impact of potential exploitation. Additionally, monitor logs for suspicious login attempts or unusual database queries. Organizations should also ensure regular backups of databases to enable recovery in case of data compromise. Finally, raising awareness among IT staff about this vulnerability and its exploitation methods will help in early detection and response.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2025-7829: SQL Injection in code-projects Church Donation System
Description
A vulnerability was found in code-projects Church Donation System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /login.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7829 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Church Donation System, specifically within the /login.php file. The vulnerability arises from improper sanitization or validation of the 'Username' parameter, which allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the database. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no known exploits are currently reported in the wild. The CVSS 4.0 base score is 6.9, indicating a medium severity level, reflecting the network attack vector, low complexity, no privileges or user interaction needed, and limited impact on confidentiality, integrity, and availability. However, the critical classification by the vendor suggests that the impact could be significant depending on the deployment context and data sensitivity. Since the vulnerability affects the login functionality, it could be leveraged to bypass authentication or extract sensitive user credentials and donation records, posing a serious threat to organizations relying on this system for financial transactions and donor management.
Potential Impact
For European organizations using the Church Donation System 1.0, this vulnerability poses a substantial risk to the confidentiality and integrity of donor data and financial information. Exploitation could lead to unauthorized access to personal and payment data, potentially violating GDPR requirements and resulting in legal and reputational consequences. The ability to manipulate login credentials could allow attackers to impersonate legitimate users or administrators, leading to fraudulent transactions or data tampering. Additionally, disruption of donation processing could impact the operational availability of charitable organizations, undermining trust and financial stability. Given the public disclosure and ease of remote exploitation, European non-profits and religious institutions using this software must consider the threat serious, especially as donation systems often contain sensitive donor information and financial records critical to organizational operations.
Mitigation Recommendations
Immediate mitigation should focus on applying patches or updates from the vendor once available. In the absence of an official patch, organizations should implement input validation and parameterized queries or prepared statements to prevent SQL injection on the 'Username' parameter in /login.php. Employing Web Application Firewalls (WAFs) with SQL injection detection and blocking rules can provide interim protection. Conduct thorough code reviews and penetration testing to identify and remediate similar injection points. Restrict database user permissions to the minimum necessary to limit the impact of potential exploitation. Additionally, monitor logs for suspicious login attempts or unusual database queries. Organizations should also ensure regular backups of databases to enable recovery in case of data compromise. Finally, raising awareness among IT staff about this vulnerability and its exploitation methods will help in early detection and response.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-18T19:19:59.578Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687b9e1ea83201eaacfd2240
Added to database: 7/19/2025, 1:31:10 PM
Last enriched: 7/27/2025, 12:58:13 AM
Last updated: 8/26/2025, 9:30:58 AM
Views: 34
Related Threats
CVE-2025-9532: SQL Injection in Portabilis i-Educar
MediumCVE-2025-56694: n/a
UnknownCVE-2025-43729: CWE-732: Incorrect Permission Assignment for Critical Resource in Dell ThinOS 10
HighCVE-2025-43882: CWE-283: Unverified Ownership in Dell ThinOS 10
HighCVE-2025-43728: CWE-693: Protection Mechanism Failure in Dell ThinOS 10
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.