ChurchCRM is an open-source church management system. A stored cross-site scripting (XSS) vulnerability exists in ChurchCRM versions 6.4.0 and prior that allows a low-privilege user with the “Manage Groups” permission to inject persistent JavaScript into group role names. The payload is saved in the database and executed whenever any user (including administrators) views a page that displays that role, such as GroupView.php or PersonView.php. This allows full session hijacking and account takeover. As of time of publication, no known patched versions are available.
References
| Link | Resource |
|---|---|
| https://github.com/ChurchCRM/CRM/security/advisories/GHSA-j9gv-26c7-3qrh | Exploit Vendor Advisory |
| https://github.com/ChurchCRM/CRM/security/advisories/GHSA-j9gv-26c7-3qrh | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-12-17 22:16
Updated : 2025-12-18 18:30
NVD link : CVE-2025-67876
Mitre link : CVE-2025-67876
CVE.ORG link : CVE-2025-67876
JSON object : View
Products Affected
churchcrm
- churchcrm
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
