CVE-2025-67874
📋 TL;DR
ChurchCRM versions before 6.5.0 echo plaintext passwords back in HTTP responses, allowing attackers to steal user credentials. This affects all ChurchCRM installations running vulnerable versions. The vulnerability significantly increases risk of account compromise and can amplify other attacks.
💻 Affected Systems
- ChurchCRM
📦 What is this software?
Churchcrm by Churchcrm
⚠️ Risk & Real-World Impact
Worst Case
Attackers harvest all user passwords, leading to complete system compromise, data theft, and potential lateral movement to other systems using reused credentials.
Likely Case
Attackers capture passwords of active users through XSS or other injection attacks, leading to unauthorized access and potential data manipulation.
If Mitigated
With proper network segmentation and monitoring, impact limited to isolated ChurchCRM system with no credential reuse elsewhere.
🎯 Exploit Status
Requires ability to intercept or view HTTP responses, which can be achieved through XSS, MITM, or other injection attacks.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.5.0
Vendor Advisory: https://github.com/ChurchCRM/CRM/security/advisories/GHSA-p98h-5xcj-5c6x
Restart Required: Yes
Instructions:
1. Backup ChurchCRM database and files. 2. Download ChurchCRM 6.5.0 or later from GitHub. 3. Replace existing installation files with new version. 4. Run database update scripts if required. 5. Restart web server.
🔧 Temporary Workarounds
WAF Rule for Password Detection
allConfigure WAF to block responses containing password patterns
🧯 If You Can't Patch
- Implement strict network segmentation to isolate ChurchCRM from other systems
- Enforce mandatory password rotation for all users and monitor for suspicious login attempts
🔍 How to Verify
Check if Vulnerable:
Test by submitting a password via login form and checking if it appears in subsequent HTTP responses
Check Version:
Check ChurchCRM admin dashboard or view /includes/version.php
Verify Fix Applied:
After upgrade, test that passwords no longer appear in HTTP responses
📡 Detection & Monitoring
Log Indicators:
- Multiple failed login attempts followed by successful logins from unusual locations
- HTTP responses containing password-like strings in access logs
Network Indicators:
- HTTP responses containing plaintext passwords in traffic captures
- Unusual outbound traffic patterns after user logins
SIEM Query:
source="churchcrm_logs" AND (event="login" AND response_size>normal) OR (http_response CONTAINS "password")