Skip to main content

CVE-2025-7859: SQL Injection in code-projects Church Donation System

Medium
VulnerabilityCVE-2025-7859cvecve-2025-7859
Published: Sun Jul 20 2025 (07/20/2025, 00:02:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Church Donation System

Description

A vulnerability classified as critical was found in code-projects Church Donation System 1.0. This vulnerability affects unknown code of the file /members/update_password_admin.php. The manipulation of the argument new_password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/20/2025, 01:01:25 UTC

Technical Analysis

CVE-2025-7859 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Church Donation System, specifically within the /members/update_password_admin.php file. The vulnerability arises from improper handling of the 'new_password' parameter, which allows an attacker to inject malicious SQL code remotely without any authentication or user interaction. This flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or deletion. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level, with an attack vector classified as network-based and no privileges or user interaction required. The impact on confidentiality, integrity, and availability is rated low individually but combined could lead to significant compromise depending on the database contents and system configuration. Although no known exploits have been reported in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The lack of available patches or mitigation guidance from the vendor further elevates the threat to organizations using this software. Given that the Church Donation System is likely used by religious organizations to manage donations and member information, the exposure of sensitive personal and financial data is a critical concern. The vulnerability's remote exploitability and absence of authentication requirements make it a high-risk entry point for attackers aiming to compromise backend databases or pivot into internal networks.

Potential Impact

For European organizations, particularly religious institutions and charities using the Church Donation System 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of donor and member data. Exploitation could lead to unauthorized disclosure of personally identifiable information (PII), financial transaction details, and administrative credentials. Such breaches could result in reputational damage, legal liabilities under GDPR, and financial losses. Additionally, attackers could alter donation records or disrupt system availability, impacting organizational operations and trust. The medium CVSS score reflects moderate technical impact but the real-world consequences could be severe due to the sensitivity of the data handled. Since the vulnerability requires no authentication and can be exploited remotely, attackers from anywhere could target these systems, increasing the threat landscape for European entities. The absence of patches means organizations must rely on alternative mitigations to protect their systems until an official fix is released.

Mitigation Recommendations

European organizations should immediately conduct a thorough audit to identify any deployments of code-projects Church Donation System version 1.0. If found, they should consider isolating these systems from external network access to prevent remote exploitation. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'new_password' parameter can provide a critical layer of defense. Organizations should also review and harden database permissions to minimize the impact of a potential injection attack, ensuring the application uses least privilege principles. Regular monitoring of logs for suspicious SQL queries or unusual access patterns is essential for early detection. If feasible, migrating to alternative donation management solutions or upgrading to a patched version (once available) is recommended. Additionally, organizations should educate administrators about the risks and ensure backups of critical data are maintained securely to enable recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-19T04:05:02.426Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687c3c51a83201eaac0015ae

Added to database: 7/20/2025, 12:46:09 AM

Last enriched: 7/20/2025, 1:01:25 AM

Last updated: 7/20/2025, 1:01:25 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats