CVE-2025-68275

4.8 MEDIUM

📋 TL;DR

ChurchCRM versions before 6.5.3 have a stored cross-site scripting vulnerability on three people management pages. This allows attackers to inject malicious scripts that execute when users view those pages. All ChurchCRM instances running vulnerable versions are affected.

💻 Affected Systems

Products:
  • ChurchCRM
Versions: All versions prior to 6.5.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists on 'View Active People', 'View Inactive People', and 'View All People' pages regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, or redirect users to malicious sites, potentially compromising the entire ChurchCRM instance and user data.

🟠

Likely Case

Attackers inject malicious JavaScript that steals session cookies or performs unauthorized actions when administrators or users view the vulnerable pages.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be neutralized before execution, preventing exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to inject malicious payload into the vulnerable fields, which typically requires some level of access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.5.3

Vendor Advisory: https://github.com/ChurchCRM/CRM/security/advisories/GHSA-3q97-q4hv-gxwr

Restart Required: Yes

Instructions:

1. Backup your ChurchCRM database and files. 2. Download ChurchCRM version 6.5.3 or later. 3. Replace existing installation with new version. 4. Restart web server. 5. Verify functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize user input on the affected pages

Content Security Policy

all

Implement strict CSP headers to prevent execution of injected scripts

🧯 If You Can't Patch

  • Restrict access to vulnerable pages to trusted users only
  • Implement web application firewall rules to block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Check ChurchCRM version in admin panel or by examining source files. If version is below 6.5.3, system is vulnerable.

Check Version:

Check ChurchCRM admin dashboard or examine version.php file in installation directory

Verify Fix Applied:

After upgrading to 6.5.3, test the three vulnerable pages with safe XSS test payloads to ensure they're properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript payloads in user input fields
  • Multiple failed XSS attempts in web server logs

Network Indicators:

  • Suspicious script tags in HTTP POST requests to people management endpoints

SIEM Query:

source="web_server_logs" AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=") AND ("ViewActivePeople" OR "ViewInactivePeople" OR "ViewAllPeople")

🔗 References

📤 Share & Export