CVE-2025-1023
Published: 18 February 2025
Summary
CVE-2025-1023 is a critical-severity SQL Injection (CWE-89) vulnerability in Churchcrm Churchcrm. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 13.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation and sanitization of the newCountName input parameter to prevent time-based blind SQL injection in the EditEventTypes functionality.
Mandates identification, reporting, and correction of the specific SQL injection flaw in ChurchCRM 5.13.0 and prior versions.
Vulnerability scanning would identify the time-based blind SQL injection vulnerability in the affected ChurchCRM application.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection vulnerability in web application (ChurchCRM) enables exploitation of public-facing app (T1190), data collection from databases (T1213.006), stored data manipulation (T1565.001), and data destruction (T1485) via arbitrary SQL queries for exfiltration, modification, or deletion.
NVD Description
A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to execute arbitrary SQL queries by exploiting a time-based blind SQL Injection vulnerability in the EditEventTypes functionality. The newCountName parameter is directly concatenated into an SQL query without…
more
proper sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to data exfiltration, modification, or deletion.
Deeper analysisAI
CVE-2025-1023, published on 2025-02-18, is a time-based blind SQL injection vulnerability (CWE-89) affecting ChurchCRM versions 5.13.0 and prior. The flaw resides in the EditEventTypes functionality, where the newCountName parameter is directly concatenated into an SQL query without proper sanitization. This allows attackers to execute arbitrary SQL queries, with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
The vulnerability enables remote exploitation over the network by unauthenticated attackers requiring low complexity and no user interaction. Attackers can manipulate database queries to achieve arbitrary command execution, potentially leading to complete data exfiltration, modification, or deletion from the affected ChurchCRM database.
Mitigation details are available in the referenced advisory at https://github.com/ChurchCRM/CRM/issues/7246.
Details
- CWE(s)