Server-Side Request Forgery Vulnerability in ChurchCRM by ChurchCRM
CVE-2025-3954

6.3MEDIUM

Key Information:

Vendor

ChurchCRM

Status
Vendor
CVE Published:
26 April 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2025-3954?

A security vulnerability has been identified in ChurchCRM 5.16.0, specifically within the Referer Handler component. This issue allows for server-side request forgery, enabling attackers to execute unauthorized requests from the server. The vulnerability can be exploited remotely, although it is considered complex to execute, requiring an advanced understanding of the system's configurations and potential entry points. The vendor was notified of this serious security concern but has not provided any public response or patch. This situation highlights the need for prompt action and protection mechanisms for users and administrators.

Affected Version(s)

ChurchCRM 5.16.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
6.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Jelle Janssens (VulDB User)
.
CVE-2025-3954 : Server-Side Request Forgery Vulnerability in ChurchCRM by ChurchCRM