Skip to main content

CVE-2025-7929: SQL Injection in code-projects Church Donation System

Medium
VulnerabilityCVE-2025-7929cvecve-2025-7929
Published: Mon Jul 21 2025 (07/21/2025, 15:32:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Church Donation System

Description

A vulnerability was found in code-projects Church Donation System 1.0. It has been classified as critical. Affected is an unknown function of the file /members/edit_Members.php. The manipulation of the argument fname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

AI-Powered Analysis

AILast updated: 07/21/2025, 16:01:13 UTC

Technical Analysis

CVE-2025-7929 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Church Donation System, specifically within the /members/edit_Members.php file. The vulnerability arises from improper sanitization and validation of the 'fname' parameter, which is susceptible to malicious SQL payloads. This flaw allows an unauthenticated remote attacker to inject arbitrary SQL commands directly into the backend database queries. The vulnerability does not require any user interaction or privileges, making exploitation straightforward over the network. Although the exact database backend is not specified, typical SQL injection attacks could lead to unauthorized data disclosure, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of the system's data. The description also suggests that other parameters might be vulnerable, indicating a broader insecure coding practice within the application. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, no required privileges or user interaction, but limited scope and impact on confidentiality, integrity, and availability (all rated low). No known exploits are currently observed in the wild, but public disclosure increases the risk of exploitation by opportunistic attackers. No patches or mitigations have been published yet, which leaves affected installations exposed. Given the nature of the application—a donation system for churches—sensitive donor information and financial transaction data could be at risk, which may have legal and reputational consequences for affected organizations.

Potential Impact

For European organizations, particularly religious institutions and charities using the Church Donation System 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to donor personal information, including names, contact details, and potentially payment information, violating data protection regulations such as the EU's GDPR. Data integrity could be compromised, allowing attackers to alter donation records or financial data, leading to financial discrepancies and loss of trust. Availability impacts could disrupt donation processing, affecting fundraising operations. The reputational damage and potential regulatory penalties from data breaches could be substantial. Furthermore, since the vulnerability allows remote exploitation without authentication, attackers from anywhere could target European organizations, increasing the threat landscape. The lack of patches and public exploit disclosure heightens urgency for mitigation. Organizations relying on this software must consider the risk of targeted attacks or opportunistic exploitation, especially in countries with large numbers of religious institutions or active charitable sectors.

Mitigation Recommendations

Immediate mitigation steps include: 1) Conducting a thorough audit of all input parameters in the Church Donation System, especially those related to member editing functions, to identify and remediate SQL injection points. 2) Applying input validation and parameterized queries (prepared statements) to eliminate direct SQL injection vectors. 3) If source code modification is not feasible immediately, deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'fname' parameter and related inputs. 4) Restricting network access to the application to trusted IP ranges where possible, reducing exposure. 5) Monitoring logs for suspicious database errors or anomalous query patterns indicative of exploitation attempts. 6) Planning for an urgent update or patch deployment once available from the vendor or considering migration to a more secure donation management platform. 7) Educating staff about the vulnerability and potential phishing or social engineering attacks that could leverage this flaw. 8) Ensuring regular backups of the database to enable recovery in case of data tampering or loss. These steps go beyond generic advice by focusing on immediate protective controls and operational readiness until a vendor patch is released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-21T06:29:40.792Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687e60bea83201eaac114e84

Added to database: 7/21/2025, 3:46:06 PM

Last enriched: 7/21/2025, 4:01:13 PM

Last updated: 8/18/2025, 1:22:24 AM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats