CVE-2025-1023
Published: 18 February 2025
Description
Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.
Security Summary
CVE-2025-1023, published on 2025-02-18, is a time-based blind SQL injection vulnerability (CWE-89) affecting ChurchCRM versions 5.13.0 and prior. The flaw resides in the EditEventTypes functionality, where the newCountName parameter is directly concatenated into an SQL query without proper sanitization. This allows attackers to execute arbitrary SQL queries, with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
The vulnerability enables remote exploitation over the network by unauthenticated attackers requiring low complexity and no user interaction. Attackers can manipulate database queries to achieve arbitrary command execution, potentially leading to complete data exfiltration, modification, or deletion from the affected ChurchCRM database.
Mitigation details are available in the referenced advisory at https://github.com/ChurchCRM/CRM/issues/7246.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
SQL injection vulnerability in web application (ChurchCRM) enables exploitation of public-facing app (T1190), data collection from databases (T1213.006), stored data manipulation (T1565.001), and data destruction (T1485) via arbitrary SQL queries for exfiltration, modification, or deletion.