Remote Code Execution Vulnerability in ChurchCRM by ChurchCRM
CVE-2025-68109
9.1CRITICAL
What is CVE-2025-68109?
ChurchCRM, an open-source church management system, is vulnerable to a significant security flaw in its Database Restore functionality. In versions prior to 6.5.3, the system fails to properly validate the content or file extensions of uploaded files. This oversight enables attackers to upload potentially malicious files, including web shells, which can then be executed on the server. Additionally, perpetrators can upload a .htaccess file to facilitate direct access to the web shell, allowing for remote code execution on the compromised system. The issue has been addressed in version 6.5.3.
Affected Version(s)
CRM < 6.5.3
References
EPSS Score
25% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
