Skip to main content

CVE-2025-7830: SQL Injection in code-projects Church Donation System

Medium
VulnerabilityCVE-2025-7830cvecve-2025-7830
Published: Sat Jul 19 2025 (07/19/2025, 14:32:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Church Donation System

Description

A vulnerability was found in code-projects Church Donation System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /reg.php. The manipulation of the argument mobile leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

AI-Powered Analysis

AILast updated: 07/27/2025, 00:58:21 UTC

Technical Analysis

CVE-2025-7830 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Church Donation System, specifically within the /reg.php file. The vulnerability arises from improper sanitization of the 'mobile' parameter, which can be manipulated by an attacker to inject malicious SQL code. This injection flaw allows an unauthenticated remote attacker to execute arbitrary SQL commands against the backend database without requiring any user interaction or privileges. The vulnerability potentially affects other parameters as well, indicating a broader input validation weakness in the application. Exploiting this flaw could lead to unauthorized data access, data modification, or even full compromise of the database server. Although no known exploits are currently observed in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The CVSS 4.0 base score is 6.9, reflecting medium severity, with network attack vector, low complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. However, given the critical nature of SQL injection vulnerabilities and the potential for data breaches, this vulnerability demands prompt attention.

Potential Impact

For European organizations using the Church Donation System 1.0, this vulnerability poses significant risks. The system likely manages sensitive donor information, including personal and financial data, which if compromised, could lead to privacy violations under GDPR regulations. Unauthorized access or modification of donation records could disrupt financial reporting and damage organizational reputation. Additionally, attackers could leverage the SQL injection to pivot into the internal network or deploy further attacks, potentially impacting availability of donation services. The public disclosure of the vulnerability increases the likelihood of exploitation attempts, especially targeting religious or charitable organizations in Europe that rely on this software. The impact extends beyond data confidentiality to include integrity and availability of critical donation processing functions, potentially affecting fundraising operations and stakeholder trust.

Mitigation Recommendations

Immediate mitigation should include applying any available patches or updates from the vendor; however, no patch links are currently provided. In the absence of official patches, organizations should implement web application firewall (WAF) rules to detect and block SQL injection attempts targeting the /reg.php endpoint, especially focusing on the 'mobile' parameter. Input validation and sanitization should be enforced at the application level, employing parameterized queries or prepared statements to prevent injection. Conduct thorough code reviews and security testing of all input parameters beyond 'mobile' to identify and remediate similar vulnerabilities. Organizations should also monitor logs for suspicious database queries or unusual access patterns. Segmentation of the database server and limiting database user privileges can reduce the impact of a successful injection. Finally, organizations should prepare incident response plans to quickly address any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-18T19:20:02.548Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687bafb2a83201eaacfd972f

Added to database: 7/19/2025, 2:46:10 PM

Last enriched: 7/27/2025, 12:58:21 AM

Last updated: 8/28/2025, 9:08:07 AM

Views: 31

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats