CVE-2025-67874
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-16

Last updated on: 2025-12-17

Assigner: GitHub, Inc.

Description
ChurchCRM is an open-source church management system. Prior to version 6.5.0, the application echoes back plaintext passwords submitted by users in subsequent HTTP responses. This information disclosure significantly increases the risk of credential compromise and may amplify the impact of other vulnerabilities (e.g., XSS, IDOR, session fixation), enabling attackers to harvest other users’ passwords. Version 6.5.0 fixes the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-16
Last Modified
2025-12-17
Generated
2026-05-06
AI Q&A
2025-12-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
churchcrm churchcrm to 6.5.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-204 The product provides different responses to incoming requests in a way that reveals internal state information to an unauthorized actor outside of the intended control sphere.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-67874 is a vulnerability in ChurchCRM versions prior to 6.5.0 where the application echoes back plaintext passwords submitted by users in HTTP responses. This happens during actions like registration, password changes, resets, or login errors, where passwords appear in JSON payloads, HTML templates, or validation messages. This exposure allows attackers to obtain passwords through browser history, page source, client logs, caches, error pages, or by exploiting other vulnerabilities like cross-site scripting (XSS). The vulnerability increases the risk of credential compromise and can lead to account takeover and lateral movement within the system. [1]


How can this vulnerability impact me? :

This vulnerability can lead to significant credential compromise by exposing plaintext passwords in HTTP responses. Attackers with privileged access can harvest passwords not only of themselves but also of other users, especially when combined with other vulnerabilities such as XSS or insecure direct object references (IDOR). This can result in full account takeover, lateral movement within the system, contamination of logs complicating forensic investigations, and increased risk due to password reuse. The exposure also violates best practices for secret management and increases the attack surface. [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability poses compliance issues related to secret management and the improper handling of sensitive information such as passwords. Exposing plaintext passwords violates standard security practices and can lead to breaches of data protection regulations like GDPR and HIPAA, which require the protection of personal and sensitive data. This improper handling increases the risk of unauthorized access and data compromise, potentially resulting in non-compliance with these regulations. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by inspecting HTTP responses from the ChurchCRM application, especially during workflows such as registration, password changes/resets, or login errors. Look for plaintext passwords reflected in JSON payloads, templated HTML, or server-side validation messages. A proof of concept includes visiting the endpoint /SystemSettings.php and checking if plaintext passwords appear in the source code or response bodies. Network monitoring tools like curl or wget can be used to fetch these responses for inspection. For example, you can run: curl -i -X POST https://yourchurchcrm.example.com/SystemSettings.php -d 'username=youruser&password=yourpassword' and then inspect the response for echoed plaintext passwords. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading ChurchCRM to version 6.5.0 or later, where the issue of plaintext password exposure has been fixed by removing password defaults from HTML output and preventing passwords from being echoed in responses. If upgrading is not immediately possible, restrict access to the affected endpoints (e.g., /SystemSettings.php) to trusted users only, monitor logs for suspicious activity, and avoid workflows that expose passwords. Additionally, consider applying any available patches or code changes that eliminate plaintext password exposure as described in the fix, such as those that skip displaying password fields in HTML output. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart