{"id":"CVE-2025-67751","summary":"ChurchCRM has SQL Injection in Event Editor via `EN_tyid` Parameter caused by an Incomplete Fix","details":"ChurchCRM is an open-source church management system. Prior to version 6.5.0, a SQL injection vulnerability exists in the `EventEditor.php` file. When creating a new event and selecting an event type, the `EN_tyid` POST parameter is not sanitized. This allows an authenticated user with event management permissions (`isAddEvent`) to execute arbitrary SQL queries. Version 6.5.0 fixes the issue.","aliases":["GHSA-wxcc-gvfv-56fg"],"modified":"2026-04-02T13:03:31.139223Z","published":"2025-12-16T00:46:30.989Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/67xxx/CVE-2025-67751.json","cwe_ids":["CWE-89"],"cna_assigner":"GitHub_M"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/67xxx/CVE-2025-67751.json"},{"type":"ADVISORY","url":"https://github.com/ChurchCRM/CRM/security/advisories/GHSA-wxcc-gvfv-56fg"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-67751"},{"type":"FIX","url":"https://github.com/ChurchCRM/CRM/commit/2d6cf7aed9af1b9b47e125d1a2266f8e2a88f3fd"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/churchcrm/crm","events":[{"introduced":"0"},{"fixed":"c269f0b45f3a11d962fd931d902a0a54f7898a90"}]}],"versions":["2.0.0","2.0.1","2.1.0","2.1.1","2.1.10","2.1.11","2.1.2","2.1.3","2.1.4","2.1.5","2.1.6","2.1.7","2.1.9","2.10.0","2.10.1","2.10.2","2.10.3","2.10.4","2.2.0","2.2.1","2.2.2","2.2.3","2.2.4","2.3.0","2.3.1","2.3.2","2.3.3","2.3.4","2.3.5","2.4.0","2.4.1","2.4.2","2.4.3","2.4.4","2.5.0","2.5.1","2.5.2","2.6.0","2.6.1","2.6.2","2.6.3","2.7.0","2.7.1","2.7.2","2.7.3","2.7.4","2.7.5","2.8.0","2.8.0-RC1","2.8.0-RC2","2.8.1","2.8.10","2.8.11","2.8.12","2.8.13","2.8.14","2.8.15","2.8.2","2.8.3","2.8.4","2.8.5","2.8.6","2.8.7","2.8.8","2.8.9","2.9.0","2.9.0-RC1","2.9.1","2.9.2","2.9.3","2.9.4","3.0.0","3.0.1","3.0.10","3.0.11","3.0.12","3.0.13","3.0.2","3.0.3","3.0.4","3.0.5","3.0.6","3.0.8","3.0.9","3.1.0","3.1.1","3.1.2","3.2.0","3.2.1","3.2.2","3.2.3","3.2.4","3.3.0","3.3.1","3.3.2","3.4.0","3.5.0","3.5.1","3.5.2","3.5.3","3.5.4","3.5.5","4.0.0","4.0.1","4.0.2","4.0.3","4.0.4","4.0.5","4.1.0","4.1.1","4.1.2","4.1.3","4.1.4","4.2.0","4.2.1","4.2.2","4.2.3","4.3.0","4.3.1","4.3.2","4.4.0","4.4.1","4.4.2","4.4.3","4.4.4","4.4.5","4.5.0","4.5.1","4.5.2","4.5.3","4.5.4","5.0.0","5.0.0-beta1","5.0.0-beta2","5.0.1","5.0.2","5.0.3","5.0.4","5.0.5","5.1.0","5.1.1","5.10.0","5.11.0","5.12.0","5.13.0","5.14.0","5.15.0","5.16.0","5.17.0","5.18.0","5.19.0","5.2.0","5.2.1","5.2.2","5.2.3","5.21.0","5.22.0","5.22.1","5.3.0","5.3.1","5.4.0","5.4.1","5.4.2","5.4.3","5.5.0","5.6.0","5.7.0","5.8.0","5.9.1","5.9.2","5.9.3","6.0.0","6.0.1","6.0.2","6.1.0","6.2.0","6.3.0","6.4.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-67751.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}