CVE-2025-1132

A time-based blind SQL Injection vulnerability exists in the ChurchCRM 5.13.0 and prior EditEventAttendees.php within the EN_tyid parameter. The parameter is directly inserted into an SQL query without proper sanitization, allowing attackers to inject malicious SQL commands. Please note that the vulnerability requires Administrator permissions. This flaw can potentially allow attackers to delay the response, indicating the presence of an SQL injection vulnerability. While it is a time-based blind injection, it can be exploited to gain insights into the underlying database, and with further exploitation, sensitive data could be retrieved.
References
Link Resource
https://github.com/ChurchCRM/CRM/issues/7251 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*

History

25 Feb 2025, 21:48

Type Values Removed Values Added
References () https://github.com/ChurchCRM/CRM/issues/7251 - () https://github.com/ChurchCRM/CRM/issues/7251 - Exploit, Issue Tracking, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE CWE-89
First Time Churchcrm
Churchcrm churchcrm
CPE cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*

19 Feb 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-19 09:15

Updated : 2025-02-25 21:48


NVD link : CVE-2025-1132

Mitre link : CVE-2025-1132


JSON object : View

Products Affected

churchcrm

  • churchcrm
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')