ChurchCRM is an open-source church management system. In versions prior to 6.5.3, the Database Restore functionality does not validate the content or file extension of uploaded files. As a result, an attacker can upload a web shell file and subsequently upload a .htaccess file to enable direct access to it. Once accessed, the uploaded web shell allows remote code execution (RCE) on the server. Version 6.5.3 fixes the issue.
History

Fri, 19 Dec 2025 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 18 Dec 2025 18:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*

Thu, 18 Dec 2025 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Churchcrm
Churchcrm churchcrm
Vendors & Products Churchcrm
Churchcrm churchcrm

Wed, 17 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
Description ChurchCRM is an open-source church management system. In versions prior to 6.5.3, the Database Restore functionality does not validate the content or file extension of uploaded files. As a result, an attacker can upload a web shell file and subsequently upload a .htaccess file to enable direct access to it. Once accessed, the uploaded web shell allows remote code execution (RCE) on the server. Version 6.5.3 fixes the issue.
Title ChurchCRM vulnerable to RCE with database restore functionality
Weaknesses CWE-434
CWE-494
CWE-552
CWE-78
CWE-915
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-12-17T21:29:39.452Z

Updated: 2025-12-18T15:08:39.365Z

Reserved: 2025-12-15T14:44:59.220Z

Link: CVE-2025-68109

cve-icon Vulnrichment

Updated: 2025-12-18T14:55:18.066Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-17T22:16:00.750

Modified: 2025-12-18T18:30:07.923

Link: CVE-2025-68109

cve-icon Redhat

No data.