Remote Code Execution Vulnerability in ChurchCRM by ChurchCRM
CVE-2025-68109

9.1CRITICAL

Key Information:

Vendor

Churchcrm

Status
Vendor
CVE Published:
17 December 2025

What is CVE-2025-68109?

ChurchCRM, an open-source church management system, is vulnerable to a significant security flaw in its Database Restore functionality. In versions prior to 6.5.3, the system fails to properly validate the content or file extensions of uploaded files. This oversight enables attackers to upload potentially malicious files, including web shells, which can then be executed on the server. Additionally, perpetrators can upload a .htaccess file to facilitate direct access to the web shell, allowing for remote code execution on the compromised system. The issue has been addressed in version 6.5.3.

Affected Version(s)

CRM < 6.5.3

References

EPSS Score

25% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.