You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
⚫ Critical (CWE-89: Improper Neutralization of Special Elements used in an SQL Command)
A CVE will be assigned once the ChurchCRM team reviews the issue (CVE-2025-1023)
Authorization Required
Administrator or a user with permission to list event types
Description
A vulnerability exists in ChurchCRM that allows an attacker to execute arbitrary SQL queries by exploiting a time-based blind SQL Injection vulnerability in the EditEventTypes functionality. The newCountName parameter is directly concatenated into an SQL query without proper sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to data exfiltration, modification, or deletion.
The request results in a 5-second delay, confirming the SQL Injection vulnerability.
Impact:
Data Exfiltration: Attackers can dump the database and retrieve sensitive data, such as user credentials and admin tokens.
Database Manipulation: Attackers can modify, delete, or corrupt important data.
Remote Code Execution (RCE) Possibility: Depending on the database configuration, this vulnerability could lead to RCE by leveraging database functions to execute OS-level commands.
Recommended Fix:
Use prepared statements (parameterized queries) to prevent SQL Injection. Example:
PenTeZtZMicZ
changed the title
(CVE-2025-1023) - SQL Injection in newCountName Parameter via EditEventTypes.php
Bug: (CVE-2025-1023) - SQL Injection in newCountName Parameter via EditEventTypes.php
Feb 4, 2025
Severity:
⚫ Critical (CWE-89: Improper Neutralization of Special Elements used in an SQL Command)
Authorization Required
event types
Description
A vulnerability exists in ChurchCRM that allows an attacker to execute arbitrary SQL queries by exploiting a time-based blind SQL Injection vulnerability in the EditEventTypes functionality. The
newCountName
parameter is directly concatenated into an SQL query without proper sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to data exfiltration, modification, or deletion.Exploiting the SQL Injection
Affected Asset:
http://<server_ip>/EditEventTypes.php
Vulnerable Source Code:
Steps to Reproduce:
http://<server_ip>/EditEventTypes.php
newCountName
parameter with the following SQL Injection payload:Proof of Concept (PoC):
Exploiting Time-Based Blind SQL Injection
Observed Response:
Impact:
Recommended Fix:
newCountName
variable. E.g. if it is a name, change it toInt
Environment:
The text was updated successfully, but these errors were encountered: