CVE-2025-7832: SQL Injection in code-projects Church Donation System
A vulnerability classified as critical was found in code-projects Church Donation System 1.0. This vulnerability affects unknown code of the file /members/offering.php. The manipulation of the argument trcode leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7832 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Church Donation System, specifically within the /members/offering.php file. The vulnerability arises from improper sanitization or validation of the 'trcode' parameter, which is directly used in SQL queries. This flaw allows an unauthenticated remote attacker to inject arbitrary SQL commands by manipulating the 'trcode' argument. Exploiting this vulnerability can lead to unauthorized data access, data modification, or even complete compromise of the underlying database. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level, with an attack vector that is network-based, requiring no privileges or user interaction. The impact on confidentiality, integrity, and availability is limited but present, as indicated by the CVSS vector components (VC:L, VI:L, VA:L). Although no known exploits are currently reported in the wild, the public disclosure of the exploit code increases the risk of exploitation. The absence of patches or mitigation links suggests that users of this system must take immediate action to secure their installations. Given that the Church Donation System is likely used by religious organizations to manage donations, the exposure of financial and donor data could have significant privacy and reputational consequences. The vulnerability's exploitation could also disrupt donation processing, affecting organizational operations.
Potential Impact
For European organizations, particularly religious institutions and charities using the Church Donation System, this vulnerability poses a risk of unauthorized access to sensitive donor information and financial records. Exploitation could lead to data breaches involving personal identifiable information (PII), financial fraud, or manipulation of donation records. This can damage trust and compliance with stringent European data protection regulations such as GDPR. Additionally, disruption of donation processing could impact funding streams critical to these organizations. The medium severity rating reflects that while the vulnerability does not require authentication or user interaction, the impact on confidentiality, integrity, and availability is limited but non-negligible. Organizations may face legal and financial repercussions if donor data is compromised or if service availability is affected.
Mitigation Recommendations
Given the lack of official patches, European organizations should immediately implement the following mitigations: 1) Apply input validation and sanitization on the 'trcode' parameter to prevent SQL injection, using parameterized queries or prepared statements if source code access is available. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'trcode' parameter. 3) Conduct thorough code reviews and security testing of the Church Donation System installation to identify and remediate injection points. 4) Restrict database user privileges to the minimum necessary to limit the impact of a successful injection. 5) Monitor logs for suspicious activities related to the 'trcode' parameter and unusual database queries. 6) If feasible, isolate the affected system from public networks or restrict access to trusted IPs until a patch or update is available. 7) Engage with the vendor or community for updates or patches and maintain awareness of any new exploit developments. These measures go beyond generic advice by focusing on the specific vulnerable parameter and practical compensating controls.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2025-7832: SQL Injection in code-projects Church Donation System
Description
A vulnerability classified as critical was found in code-projects Church Donation System 1.0. This vulnerability affects unknown code of the file /members/offering.php. The manipulation of the argument trcode leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7832 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Church Donation System, specifically within the /members/offering.php file. The vulnerability arises from improper sanitization or validation of the 'trcode' parameter, which is directly used in SQL queries. This flaw allows an unauthenticated remote attacker to inject arbitrary SQL commands by manipulating the 'trcode' argument. Exploiting this vulnerability can lead to unauthorized data access, data modification, or even complete compromise of the underlying database. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level, with an attack vector that is network-based, requiring no privileges or user interaction. The impact on confidentiality, integrity, and availability is limited but present, as indicated by the CVSS vector components (VC:L, VI:L, VA:L). Although no known exploits are currently reported in the wild, the public disclosure of the exploit code increases the risk of exploitation. The absence of patches or mitigation links suggests that users of this system must take immediate action to secure their installations. Given that the Church Donation System is likely used by religious organizations to manage donations, the exposure of financial and donor data could have significant privacy and reputational consequences. The vulnerability's exploitation could also disrupt donation processing, affecting organizational operations.
Potential Impact
For European organizations, particularly religious institutions and charities using the Church Donation System, this vulnerability poses a risk of unauthorized access to sensitive donor information and financial records. Exploitation could lead to data breaches involving personal identifiable information (PII), financial fraud, or manipulation of donation records. This can damage trust and compliance with stringent European data protection regulations such as GDPR. Additionally, disruption of donation processing could impact funding streams critical to these organizations. The medium severity rating reflects that while the vulnerability does not require authentication or user interaction, the impact on confidentiality, integrity, and availability is limited but non-negligible. Organizations may face legal and financial repercussions if donor data is compromised or if service availability is affected.
Mitigation Recommendations
Given the lack of official patches, European organizations should immediately implement the following mitigations: 1) Apply input validation and sanitization on the 'trcode' parameter to prevent SQL injection, using parameterized queries or prepared statements if source code access is available. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'trcode' parameter. 3) Conduct thorough code reviews and security testing of the Church Donation System installation to identify and remediate injection points. 4) Restrict database user privileges to the minimum necessary to limit the impact of a successful injection. 5) Monitor logs for suspicious activities related to the 'trcode' parameter and unusual database queries. 6) If feasible, isolate the affected system from public networks or restrict access to trusted IPs until a patch or update is available. 7) Engage with the vendor or community for updates or patches and maintain awareness of any new exploit developments. These measures go beyond generic advice by focusing on the specific vulnerable parameter and practical compensating controls.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-18T19:20:09.771Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687bba43a83201eaacfdeef0
Added to database: 7/19/2025, 3:31:15 PM
Last enriched: 7/27/2025, 12:56:40 AM
Last updated: 10/18/2025, 9:23:54 PM
Views: 57
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-47410: CWE-352 Cross-Site Request Forgery (CSRF) in Apache Software Foundation Apache Geode
UnknownCVE-2025-11926: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdreams Related Posts Lite
MediumCVE-2025-9890: CWE-352 Cross-Site Request Forgery (CSRF) in mndpsingh287 Theme Editor
HighCVE-2025-5555: Stack-based Buffer Overflow in Nixdorf Wincor PORT IO Driver
HighCVE-2025-11256: CWE-285 Improper Authorization in kognetiks Kognetiks Chatbot
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.