ChurchCRM is an open-source church management system. In versions prior to 6.5.3, the Database Restore functionality does not validate the content or file extension of uploaded files. As a result, an attacker can upload a web shell file and subsequently upload a .htaccess file to enable direct access to it. Once accessed, the uploaded web shell allows remote code execution (RCE) on the server. Version 6.5.3 fixes the issue.
History

Wed, 17 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
Description ChurchCRM is an open-source church management system. In versions prior to 6.5.3, the Database Restore functionality does not validate the content or file extension of uploaded files. As a result, an attacker can upload a web shell file and subsequently upload a .htaccess file to enable direct access to it. Once accessed, the uploaded web shell allows remote code execution (RCE) on the server. Version 6.5.3 fixes the issue.
Title ChurchCRM vulnerable to RCE with database restore functionality
Weaknesses CWE-434
CWE-494
CWE-552
CWE-78
CWE-915
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-12-17T21:29:39.452Z

Reserved: 2025-12-15T14:44:59.220Z

Link: CVE-2025-68109

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-17T22:16:00.750

Modified: 2025-12-17T22:16:00.750

Link: CVE-2025-68109

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.