A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to execute arbitrary SQL queries by exploiting a time-based blind SQL Injection vulnerability in the EditEventTypes functionality. The newCountName parameter is directly concatenated into an SQL query without proper sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to data exfiltration, modification, or deletion.
References
Link | Resource |
---|---|
https://github.com/ChurchCRM/CRM/issues/7246 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Feb 2025, 15:21
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CPE | cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | () https://github.com/ChurchCRM/CRM/issues/7246 - Exploit, Issue Tracking, Third Party Advisory | |
First Time |
Churchcrm
Churchcrm churchcrm |
18 Feb 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-18 10:15
Updated : 2025-02-21 15:21
NVD link : CVE-2025-1023
Mitre link : CVE-2025-1023
CVE.ORG link : CVE-2025-1023
JSON object : View
Products Affected
churchcrm
- churchcrm
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')