CVE-2025-66397

8.3 HIGH

📋 TL;DR

This vulnerability allows any authenticated user in ChurchCRM to perform Kiosk Manager actions like allowing/accepting kiosk registrations, reloading kiosks, and identifying kiosks. It affects all ChurchCRM installations prior to version 6.5.3 where the Kiosk Manager feature is enabled. The broken access control bypasses intended permission checks.

💻 Affected Systems

Products:
  • ChurchCRM
Versions: All versions prior to 6.5.3
Operating Systems: All platforms running ChurchCRM
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Kiosk Manager feature to be enabled and at least one authenticated user account.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could register unauthorized kiosk devices, potentially allowing physical access to church facilities or enabling data exfiltration through kiosk interfaces.

🟠

Likely Case

Malicious authenticated users could disrupt kiosk operations, register unauthorized devices, or gain access to kiosk management functions they shouldn't have.

🟢

If Mitigated

With proper access controls and authentication mechanisms, impact would be limited to authorized users only performing intended actions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.5.3

Vendor Advisory: https://github.com/ChurchCRM/CRM/security/advisories/GHSA-32vr-ch3p-wmr5

Restart Required: Yes

Instructions:

1. Backup your ChurchCRM database and files. 2. Download ChurchCRM version 6.5.3 or later from the official repository. 3. Replace existing installation files with new version. 4. Run database migrations if required. 5. Restart web server services.

🔧 Temporary Workarounds

Disable Kiosk Manager

all

Temporarily disable the Kiosk Manager feature until patching can be completed.

Edit ChurchCRM configuration to disable kiosk functionality

Restrict User Permissions

all

Review and restrict user permissions to minimize attack surface.

Audit user accounts and remove unnecessary privileges

🧯 If You Can't Patch

  • Implement network segmentation to isolate ChurchCRM from sensitive systems
  • Enable detailed logging and monitoring for kiosk-related activities

🔍 How to Verify

Check if Vulnerable:

Check ChurchCRM version in admin interface or via version file. If version is below 6.5.3, system is vulnerable.

Check Version:

Check /churchcrm/version.txt or admin dashboard version display

Verify Fix Applied:

After patching, verify version shows 6.5.3 or higher and test that only authorized users can perform kiosk management actions.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized kiosk registration attempts
  • Kiosk management actions from non-admin users
  • Multiple failed permission checks in access logs

Network Indicators:

  • Unusual kiosk registration traffic patterns
  • Kiosk API calls from unexpected user accounts

SIEM Query:

source="churchcrm" AND (event="kiosk_registration" OR event="kiosk_management") AND user_role!="admin"

🔗 References

📤 Share & Export