Skip to main content

CVE-2025-7928: SQL Injection in code-projects Church Donation System

Medium
VulnerabilityCVE-2025-7928cvecve-2025-7928
Published: Mon Jul 21 2025 (07/21/2025, 15:02:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Church Donation System

Description

A vulnerability was found in code-projects Church Donation System 1.0 and classified as critical. This issue affects some unknown processing of the file /members/edit_user.php. The manipulation of the argument firstname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

AI-Powered Analysis

AILast updated: 07/21/2025, 15:31:16 UTC

Technical Analysis

CVE-2025-7928 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Church Donation System, specifically within the /members/edit_user.php file. The vulnerability arises from improper sanitization or validation of the 'firstname' parameter, allowing an attacker to inject malicious SQL code remotely without any authentication or user interaction. This injection flaw can potentially be exploited to manipulate backend database queries, leading to unauthorized data access, data modification, or even complete compromise of the database. Although the exact extent of affected parameters beyond 'firstname' is unknown, the presence of multiple vulnerable inputs could exacerbate the impact. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level, with network attack vector, low attack complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. The exploit has been publicly disclosed but there are no confirmed reports of active exploitation in the wild. The lack of available patches or vendor advisories increases the risk for organizations still running this software version. Given the nature of SQL Injection, attackers could leverage this flaw to extract sensitive donor information, alter donation records, or disrupt the system's operation, which is critical for organizations relying on this system for fundraising and donor management.

Potential Impact

For European organizations using the Church Donation System 1.0, this vulnerability poses significant risks to the confidentiality and integrity of sensitive donor data, including personal identification and financial contributions. Exploitation could lead to unauthorized disclosure of donor identities, financial fraud, or manipulation of donation records, undermining trust and potentially violating GDPR regulations concerning personal data protection. Additionally, disruption of donation processing could impact the operational availability of fundraising activities, affecting revenue streams for religious and charitable organizations. The reputational damage from a data breach or service disruption could be severe, especially for organizations with high public visibility or those subject to strict compliance requirements. Given the remote and unauthenticated nature of the exploit, attackers could target multiple organizations indiscriminately, increasing the threat landscape across Europe.

Mitigation Recommendations

European organizations should immediately assess their exposure to the Church Donation System 1.0 and prioritize upgrading to a patched or newer version once available. In the absence of an official patch, organizations should implement web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'firstname' parameter and other input fields. Input validation and parameterized queries should be enforced at the application level to prevent injection. Conduct thorough code reviews and penetration testing focused on all user input handling in the /members/edit_user.php module. Organizations should also monitor logs for suspicious database query patterns or anomalous access attempts. Segmentation of the database and limiting database user privileges can reduce the impact of a successful injection. Finally, ensure that backups are current and tested to enable recovery in case of data corruption or loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-21T06:29:37.795Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687e59b5a83201eaac111004

Added to database: 7/21/2025, 3:16:05 PM

Last enriched: 7/21/2025, 3:31:16 PM

Last updated: 8/18/2025, 1:22:24 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats