HomeChurchcrmCVE-2025-1132

CVE-2025-1132

CRITICAL
9.3CVSS
Published: 2025-02-19
Updated: 2025-02-25
AI Analysis

Description

A time-based blind SQL Injection vulnerability exists in the ChurchCRM 5.13.0 and prior EditEventAttendees.php within the EN_tyid parameter. The parameter is directly inserted into an SQL query without proper sanitization, allowing attackers to inject malicious SQL commands. Please note that the vulnerability requires Administrator permissions. This flaw can potentially allow attackers to delay the response, indicating the presence of an SQL injection vulnerability. While it is a time-based blind injection, it can be exploited to gain insights into the underlying database, and with further exploitation, sensitive data could be retrieved.

CVSS Metrics

Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:H/U:Red
Attack Vector
network
Complexity
low
Privileges
high
User Action
none
Confidentiality
undefined
Integrity
undefined
Availability
undefined
Weaknesses
CWE-89CWE-89

Metadata

Primary Vendor
CHURCHCRM
Published
2/19/2025
Last Modified
2/25/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

churchcrm : churchcrm

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-1132 | CRITICAL Severity | CVEDatabase.com | CVEDatabase.com