CVE-2025-7859: SQL Injection in code-projects Church Donation System
A vulnerability classified as critical was found in code-projects Church Donation System 1.0. This vulnerability affects unknown code of the file /members/update_password_admin.php. The manipulation of the argument new_password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7859 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Church Donation System, specifically within the /members/update_password_admin.php file. The vulnerability arises from improper handling of the 'new_password' parameter, which allows an attacker to inject malicious SQL code remotely without any authentication or user interaction. This flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or deletion. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level, with an attack vector classified as network-based and no privileges or user interaction required. The impact on confidentiality, integrity, and availability is rated low individually but combined could lead to significant compromise depending on the database contents and system configuration. Although no known exploits have been reported in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The lack of available patches or mitigation guidance from the vendor further elevates the threat to organizations using this software. Given that the Church Donation System is likely used by religious organizations to manage donations and member information, the exposure of sensitive personal and financial data is a critical concern. The vulnerability's remote exploitability and absence of authentication requirements make it a high-risk entry point for attackers aiming to compromise backend databases or pivot into internal networks.
Potential Impact
For European organizations, particularly religious institutions and charities using the Church Donation System 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of donor and member data. Exploitation could lead to unauthorized disclosure of personally identifiable information (PII), financial transaction details, and administrative credentials. Such breaches could result in reputational damage, legal liabilities under GDPR, and financial losses. Additionally, attackers could alter donation records or disrupt system availability, impacting organizational operations and trust. The medium CVSS score reflects moderate technical impact but the real-world consequences could be severe due to the sensitivity of the data handled. Since the vulnerability requires no authentication and can be exploited remotely, attackers from anywhere could target these systems, increasing the threat landscape for European entities. The absence of patches means organizations must rely on alternative mitigations to protect their systems until an official fix is released.
Mitigation Recommendations
European organizations should immediately conduct a thorough audit to identify any deployments of code-projects Church Donation System version 1.0. If found, they should consider isolating these systems from external network access to prevent remote exploitation. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'new_password' parameter can provide a critical layer of defense. Organizations should also review and harden database permissions to minimize the impact of a potential injection attack, ensuring the application uses least privilege principles. Regular monitoring of logs for suspicious SQL queries or unusual access patterns is essential for early detection. If feasible, migrating to alternative donation management solutions or upgrading to a patched version (once available) is recommended. Additionally, organizations should educate administrators about the risks and ensure backups of critical data are maintained securely to enable recovery in case of compromise.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-7859: SQL Injection in code-projects Church Donation System
Description
A vulnerability classified as critical was found in code-projects Church Donation System 1.0. This vulnerability affects unknown code of the file /members/update_password_admin.php. The manipulation of the argument new_password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7859 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Church Donation System, specifically within the /members/update_password_admin.php file. The vulnerability arises from improper handling of the 'new_password' parameter, which allows an attacker to inject malicious SQL code remotely without any authentication or user interaction. This flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or deletion. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level, with an attack vector classified as network-based and no privileges or user interaction required. The impact on confidentiality, integrity, and availability is rated low individually but combined could lead to significant compromise depending on the database contents and system configuration. Although no known exploits have been reported in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The lack of available patches or mitigation guidance from the vendor further elevates the threat to organizations using this software. Given that the Church Donation System is likely used by religious organizations to manage donations and member information, the exposure of sensitive personal and financial data is a critical concern. The vulnerability's remote exploitability and absence of authentication requirements make it a high-risk entry point for attackers aiming to compromise backend databases or pivot into internal networks.
Potential Impact
For European organizations, particularly religious institutions and charities using the Church Donation System 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of donor and member data. Exploitation could lead to unauthorized disclosure of personally identifiable information (PII), financial transaction details, and administrative credentials. Such breaches could result in reputational damage, legal liabilities under GDPR, and financial losses. Additionally, attackers could alter donation records or disrupt system availability, impacting organizational operations and trust. The medium CVSS score reflects moderate technical impact but the real-world consequences could be severe due to the sensitivity of the data handled. Since the vulnerability requires no authentication and can be exploited remotely, attackers from anywhere could target these systems, increasing the threat landscape for European entities. The absence of patches means organizations must rely on alternative mitigations to protect their systems until an official fix is released.
Mitigation Recommendations
European organizations should immediately conduct a thorough audit to identify any deployments of code-projects Church Donation System version 1.0. If found, they should consider isolating these systems from external network access to prevent remote exploitation. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'new_password' parameter can provide a critical layer of defense. Organizations should also review and harden database permissions to minimize the impact of a potential injection attack, ensuring the application uses least privilege principles. Regular monitoring of logs for suspicious SQL queries or unusual access patterns is essential for early detection. If feasible, migrating to alternative donation management solutions or upgrading to a patched version (once available) is recommended. Additionally, organizations should educate administrators about the risks and ensure backups of critical data are maintained securely to enable recovery in case of compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-19T04:05:02.426Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687c3c51a83201eaac0015ae
Added to database: 7/20/2025, 12:46:09 AM
Last enriched: 7/20/2025, 1:01:25 AM
Last updated: 7/20/2025, 1:01:25 AM
Views: 2
Related Threats
CVE-2025-7861: SQL Injection in code-projects Church Donation System
MediumCVE-2025-53770: CWE-502: Deserialization of Untrusted Data in Microsoft Microsoft SharePoint Enterprise Server 2016
CriticalCVE-2025-7860: SQL Injection in code-projects Church Donation System
MediumCVE-2025-7858: Cross Site Scripting in PHPGurukul Apartment Visitors Management System
MediumCVE-2025-7857: Cross Site Scripting in PHPGurukul Apartment Visitors Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.