{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-11938","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-10-18T12:54:26.566Z","datePublished":"2025-10-19T07:32:05.836Z","dateUpdated":"2026-02-24T07:01:51.541Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T07:01:51.541Z"},"title":"ChurchCRM setup.php deserialization","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-502","lang":"en","description":"Deserialization"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-20","lang":"en","description":"Improper Input Validation"}]}],"affected":[{"vendor":"n/a","product":"ChurchCRM","versions":[{"version":"5.0","status":"affected"},{"version":"5.1","status":"affected"},{"version":"5.2","status":"affected"},{"version":"5.3","status":"affected"},{"version":"5.4","status":"affected"},{"version":"5.5","status":"affected"},{"version":"5.6","status":"affected"},{"version":"5.7","status":"affected"},{"version":"5.8","status":"affected"},{"version":"5.9","status":"affected"},{"version":"5.10","status":"affected"},{"version":"5.11","status":"affected"},{"version":"5.12","status":"affected"},{"version":"5.13","status":"affected"},{"version":"5.14","status":"affected"},{"version":"5.15","status":"affected"},{"version":"5.16","status":"affected"},{"version":"5.17","status":"affected"},{"version":"5.18.0","status":"affected"}],"cpes":["cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in ChurchCRM up to 5.18.0. This vulnerability affects unknown code of the file setup/routes/setup.php. Performing a manipulation of the argument DB_PASSWORD/ROOT_PATH/URL results in deserialization. The attack may be initiated remotely. The attack's complexity is rated as high. It is stated that the exploitability is difficult. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.3,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.6,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.6,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.1,"vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-10-18T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-10-18T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-10-27T15:31:43.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"uartu0 (VulDB User)","type":"reporter"},{"lang":"en","value":"VulDB","type":"coordinator"}],"references":[{"url":"https://vuldb.com/?id.329014","name":"VDB-329014 | ChurchCRM setup.php deserialization","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.329014","name":"VDB-329014 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.671083","name":"Submit #671083 | ChurchCRM <= 5.18.0 Remote Code Execution (RCE)","tags":["third-party-advisory"]},{"url":"https://github.com/uartu0/advisories/blob/main/churchcrm-setup-rce-2025.md","tags":["exploit"]}],"tags":["x_open-source"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-20T19:03:26.856206Z","id":"CVE-2025-11938","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-20T19:03:38.434Z"}}]}}