First published: Wed Feb 19 2025(Updated: )
A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based blind SQL Injection vulnerability in the EditEventAttendees functionality. The EID parameter is directly concatenated into an SQL query without proper sanitization, making it susceptible to SQL injection attacks. An attacker can manipulate the query, potentially leading to data exfiltration, modification, or deletion. Please note that this vulnerability requires Administrator privileges.
Credit: b7efe717-a805-47cf-8e9a-921fca0ce0ce
Affected Software | Affected Version | How to fix |
---|---|---|
ChurchCRM | <5.13.0 |
To prevent SQL injection, use prepared statements with parameterised queries. Additionally, implement input validation to reject dangerous characters, apply the principle of least privilege to database users to minimise potential damage, and assign appropriate data types in PHP, such as converting EID to an integer if it represents a numeric value.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1133 is classified as a critical vulnerability due to its potential for SQL injection and arbitrary code execution.
To fix CVE-2025-1133, upgrade to ChurchCRM version 5.13.1 or later, where the vulnerability has been patched.
CVE-2025-1133 affects ChurchCRM versions 5.13.0 and earlier.
CVE-2025-1133 allows attackers to execute arbitrary SQL queries through a boolean-based blind SQL injection.
You can detect CVE-2025-1133 by running security scans on ChurchCRM installations for known SQL injection vulnerabilities.