A time-based blind SQL Injection vulnerability exists in the ChurchCRM 5.13.0 and prior EditEventAttendees.php within the EN_tyid parameter. The parameter is directly inserted into an SQL query without proper sanitization, allowing attackers to inject malicious SQL commands. Please note that the vulnerability requires Administrator permissions. This flaw can potentially allow attackers to delay the response, indicating the presence of an SQL injection vulnerability. While it is a time-based blind injection, it can be exploited to gain insights into the underlying database, and with further exploitation, sensitive data could be retrieved.
References
Link | Resource |
---|---|
https://github.com/ChurchCRM/CRM/issues/7251 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
25 Feb 2025, 21:48
Type | Values Removed | Values Added |
---|---|---|
First Time |
Churchcrm
Churchcrm churchcrm |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CPE | cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:* | |
Summary |
|
|
References | () https://github.com/ChurchCRM/CRM/issues/7251 - Exploit, Issue Tracking, Third Party Advisory |
19 Feb 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-19 09:15
Updated : 2025-02-25 21:48
NVD link : CVE-2025-1132
Mitre link : CVE-2025-1132
CVE.ORG link : CVE-2025-1132
JSON object : View
Products Affected
churchcrm
- churchcrm
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')