Cyber Posture

CVE-2025-1023

CriticalPublic PoC

Published: 18 February 2025

Published
18 February 2025
Modified
21 February 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0275 86.1th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.

Security Summary

CVE-2025-1023, published on 2025-02-18, is a time-based blind SQL injection vulnerability (CWE-89) affecting ChurchCRM versions 5.13.0 and prior. The flaw resides in the EditEventTypes functionality, where the newCountName parameter is directly concatenated into an SQL query without proper sanitization. This allows attackers to execute arbitrary SQL queries, with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

The vulnerability enables remote exploitation over the network by unauthenticated attackers requiring low complexity and no user interaction. Attackers can manipulate database queries to achieve arbitrary command execution, potentially leading to complete data exfiltration, modification, or deletion from the affected ChurchCRM database.

Mitigation details are available in the referenced advisory at https://github.com/ChurchCRM/CRM/issues/7246.

Details

CWE(s)
CWE-89

Affected Products

churchcrm
churchcrm
≤ 5.13.0

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
T1485 Data Destruction Impact
Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources.
T1565.001 Stored Data Manipulation Impact
Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.
Why these techniques?

SQL injection vulnerability in web application (ChurchCRM) enables exploitation of public-facing app (T1190), data collection from databases (T1213.006), stored data manipulation (T1565.001), and data destruction (T1485) via arbitrary SQL queries for exfiltration, modification, or deletion.

References