Description
A vulnerability was found in ChurchCRM up to 5.18.0. This vulnerability affects unknown code of the file setup/routes/setup.php. Performing a manipulation of the argument DB_PASSWORD/ROOT_PATH/URL results in deserialization. The attack may be initiated remotely. The attack's complexity is rated as high. It is stated that the exploitability is difficult. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
References (4)
Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry
technical-description
https://vuldb.com/?id.329014
Permissions Required, VDB Entry signature
permissions-required
https://vuldb.com/?ctiid.329014
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.671083
Exploit, Third Party Advisory exploit
https://github.com/uartu0/advisories/blob/main/churchcrm-setup-rce-2025.md
Scores
CVSS v3
5.6
EPSS
0.0010
EPSS Percentile
26.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-20
CWE-502
Status
published
Products (1)
churchcrm/churchcrm
< 5.18.0
Published
Oct 19, 2025
Tracked Since
Feb 18, 2026