CVE-2025-7830: SQL Injection in code-projects Church Donation System
A vulnerability was found in code-projects Church Donation System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /reg.php. The manipulation of the argument mobile leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
AI Analysis
Technical Summary
CVE-2025-7830 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Church Donation System, specifically within the /reg.php file. The vulnerability arises from improper sanitization of the 'mobile' parameter, which allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw can lead to unauthorized access to the backend database, enabling attackers to read, modify, or delete sensitive data related to church donations and donor information. The vulnerability may also affect other parameters, increasing the attack surface. Although the CVSS 4.0 base score is 6.9 (medium severity), the potential impact on confidentiality, integrity, and availability of critical donation system data is significant. The exploit has been publicly disclosed, increasing the risk of exploitation, although no known active exploits have been reported in the wild yet. The vulnerability does not require privileges or user interaction, making it easier to exploit remotely over the network. The lack of available patches or mitigations from the vendor further exacerbates the risk for organizations using this software.
Potential Impact
For European organizations, especially religious institutions and charities using the Church Donation System 1.0, this vulnerability poses a serious risk. Exploitation could lead to unauthorized disclosure of donor personal and financial information, undermining donor trust and violating data protection regulations such as the GDPR. Data integrity could be compromised, allowing attackers to alter donation records or financial data, potentially causing financial discrepancies and reputational damage. Availability impacts could disrupt donation processing, affecting fundraising operations. Given the sensitivity of donor data and the regulatory environment in Europe, exploitation could result in significant legal and financial consequences. Additionally, the public disclosure of the exploit increases the likelihood of opportunistic attacks targeting vulnerable installations across Europe.
Mitigation Recommendations
Immediate mitigation steps include implementing web application firewalls (WAFs) with rules to detect and block SQL injection attempts targeting the /reg.php endpoint and the 'mobile' parameter. Organizations should conduct thorough input validation and sanitization on all user-supplied data, especially parameters involved in database queries. Since no official patch is currently available, organizations should consider isolating or restricting access to the affected system, limiting exposure to the internet or untrusted networks. Monitoring database logs and web server logs for unusual query patterns or errors related to SQL injection attempts is critical for early detection. If feasible, migrating to a more secure or updated donation management system should be planned. Additionally, organizations should review and enhance their incident response plans to address potential data breaches resulting from exploitation of this vulnerability.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Ireland
CVE-2025-7830: SQL Injection in code-projects Church Donation System
Description
A vulnerability was found in code-projects Church Donation System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /reg.php. The manipulation of the argument mobile leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
AI-Powered Analysis
Technical Analysis
CVE-2025-7830 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Church Donation System, specifically within the /reg.php file. The vulnerability arises from improper sanitization of the 'mobile' parameter, which allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw can lead to unauthorized access to the backend database, enabling attackers to read, modify, or delete sensitive data related to church donations and donor information. The vulnerability may also affect other parameters, increasing the attack surface. Although the CVSS 4.0 base score is 6.9 (medium severity), the potential impact on confidentiality, integrity, and availability of critical donation system data is significant. The exploit has been publicly disclosed, increasing the risk of exploitation, although no known active exploits have been reported in the wild yet. The vulnerability does not require privileges or user interaction, making it easier to exploit remotely over the network. The lack of available patches or mitigations from the vendor further exacerbates the risk for organizations using this software.
Potential Impact
For European organizations, especially religious institutions and charities using the Church Donation System 1.0, this vulnerability poses a serious risk. Exploitation could lead to unauthorized disclosure of donor personal and financial information, undermining donor trust and violating data protection regulations such as the GDPR. Data integrity could be compromised, allowing attackers to alter donation records or financial data, potentially causing financial discrepancies and reputational damage. Availability impacts could disrupt donation processing, affecting fundraising operations. Given the sensitivity of donor data and the regulatory environment in Europe, exploitation could result in significant legal and financial consequences. Additionally, the public disclosure of the exploit increases the likelihood of opportunistic attacks targeting vulnerable installations across Europe.
Mitigation Recommendations
Immediate mitigation steps include implementing web application firewalls (WAFs) with rules to detect and block SQL injection attempts targeting the /reg.php endpoint and the 'mobile' parameter. Organizations should conduct thorough input validation and sanitization on all user-supplied data, especially parameters involved in database queries. Since no official patch is currently available, organizations should consider isolating or restricting access to the affected system, limiting exposure to the internet or untrusted networks. Monitoring database logs and web server logs for unusual query patterns or errors related to SQL injection attempts is critical for early detection. If feasible, migrating to a more secure or updated donation management system should be planned. Additionally, organizations should review and enhance their incident response plans to address potential data breaches resulting from exploitation of this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-18T19:20:02.548Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687bafb2a83201eaacfd972f
Added to database: 7/19/2025, 2:46:10 PM
Last enriched: 7/19/2025, 3:01:13 PM
Last updated: 7/19/2025, 3:01:13 PM
Views: 2
Related Threats
CVE-2025-7840: Cross Site Scripting in Campcodes Online Movie Theater Seat Reservation System
MediumCVE-2025-7838: SQL Injection in Campcodes Online Movie Theater Seat Reservation System
MediumCVE-2025-7837: Buffer Overflow in TOTOLINK T6
HighCVE-2025-7836: Command Injection in D-Link DIR-816L
MediumCVE-2025-54313: CWE-506 Embedded Malicious Code in prettier eslint-config-prettier
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.