ChurchCRM is an open-source church management system. Prior to version 6.5.0, the application echoes back plaintext passwords submitted by users in subsequent HTTP responses. This information disclosure significantly increases the risk of credential compromise and may amplify the impact of other vulnerabilities (e.g., XSS, IDOR, session fixation), enabling attackers to harvest other users’ passwords. Version 6.5.0 fixes the issue.
History

Tue, 16 Dec 2025 01:15:00 +0000

Type Values Removed Values Added
Description ChurchCRM is an open-source church management system. Prior to version 6.5.0, the application echoes back plaintext passwords submitted by users in subsequent HTTP responses. This information disclosure significantly increases the risk of credential compromise and may amplify the impact of other vulnerabilities (e.g., XSS, IDOR, session fixation), enabling attackers to harvest other users’ passwords. Version 6.5.0 fixes the issue.
Title ChurchCRM has plaintext password return in response
Weaknesses CWE-204
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-12-16T00:44:43.509Z

Reserved: 2025-12-12T18:53:03.237Z

Link: CVE-2025-67874

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-16T01:15:53.243

Modified: 2025-12-16T01:15:53.243

Link: CVE-2025-67874

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.