First published: Wed Feb 19 2025(Updated: )
A vulnerability exists in ChurchCRM 5.13.0 that allows an attacker to execute arbitrary JavaScript in a victim's browser via Reflected Cross-Site Scripting (XSS) in the EditEventAttendees.php page. This requires Administration privileges and affects the EID parameter. The flaw allows an attacker to steal session cookies, perform actions on behalf of an authenticated user, and gain unauthorized access to the application.
Credit: b7efe717-a805-47cf-8e9a-921fca0ce0ce
Affected Software | Affected Version | How to fix |
---|---|---|
ChurchCRM |
To mitigate this vulnerability, implement output encoding to prevent malicious script injection in user-controlled input fields, ensure that session cookies are set with the HttpOnly and Secure flags to protect them from client-side access, and validate and sanitize user input before reflecting it in web pages.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1024 has a medium severity rating due to its potential for exploitation via reflected cross-site scripting.
To fix CVE-2025-1024, update ChurchCRM to the latest version where this vulnerability has been patched.
Users with Administration privileges in ChurchCRM 5.13.0 are affected by CVE-2025-1024.
CVE-2025-1024 exploits the EID parameter on the EditEventAttendees.php page to execute arbitrary JavaScript.
CVE-2025-1024 is a Reflected Cross-Site Scripting (XSS) vulnerability.