A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to execute arbitrary SQL queries by exploiting a time-based blind SQL Injection vulnerability in the EditEventTypes functionality. The newCountName parameter is directly concatenated into an SQL query without proper sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to data exfiltration, modification, or deletion.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/ChurchCRM/CRM/issues/7246 | Exploit Issue Tracking Third Party Advisory | 
Configurations
                    History
                    21 Feb 2025, 15:21
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 9.8 | 
| References | () https://github.com/ChurchCRM/CRM/issues/7246 - Exploit, Issue Tracking, Third Party Advisory | |
| CPE | cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:* | |
| First Time | Churchcrm Churchcrm churchcrm | |
| Summary | 
 | 
18 Feb 2025, 10:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-02-18 10:15
Updated : 2025-02-21 15:21
NVD link : CVE-2025-1023
Mitre link : CVE-2025-1023
CVE.ORG link : CVE-2025-1023
JSON object : View
Products Affected
                churchcrm
- churchcrm
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
