Remote Code Execution Vulnerability in ChurchCRM by ChurchCRM
CVE-2025-68109

9.1CRITICAL

Key Information:

Vendor

Churchcrm

Status
Vendor
CVE Published:
17 December 2025

What is CVE-2025-68109?

ChurchCRM, an open-source church management system, is vulnerable to a significant security flaw in its Database Restore functionality. In versions prior to 6.5.3, the system fails to properly validate the content or file extensions of uploaded files. This oversight enables attackers to upload potentially malicious files, including web shells, which can then be executed on the server. Additionally, perpetrators can upload a .htaccess file to facilitate direct access to the web shell, allowing for remote code execution on the compromised system. The issue has been addressed in version 6.5.3.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

CRM < 6.5.3

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.