A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based blind SQL Injection vulnerability in the EditEventAttendees functionality. The EID parameter is directly concatenated into an SQL query without proper sanitization, making it susceptible to SQL injection attacks. An attacker can manipulate the query, potentially leading to data exfiltration, modification, or deletion. Please note that this vulnerability requires Administrator privileges.
References
Link | Resource |
---|---|
https://github.com/ChurchCRM/CRM/issues/7252 | Exploit Third Party Advisory |
Configurations
History
25 Feb 2025, 21:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ChurchCRM/CRM/issues/7252 - Exploit, Third Party Advisory | |
First Time |
Churchcrm
Churchcrm churchcrm |
|
Summary |
|
|
CPE | cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
19 Feb 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-19 09:15
Updated : 2025-02-25 21:26
NVD link : CVE-2025-1133
Mitre link : CVE-2025-1133
CVE.ORG link : CVE-2025-1133
JSON object : View
Products Affected
churchcrm
- churchcrm
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')