Metrics
Affected Vendors & Products
Solution
To mitigate this vulnerability, implement output encoding to prevent malicious script injection in user-controlled input fields, ensure that session cookies are set with the HttpOnly and Secure flags to protect them from client-side access, and validate and sanitize user input before reflecting it in web pages.
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://github.com/ChurchCRM/CRM/issues/7250 |
![]() ![]() |
Tue, 25 Feb 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Churchcrm
Churchcrm churchcrm |
|
Weaknesses | CWE-79 | |
CPEs | cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:* | |
Vendors & Products |
Churchcrm
Churchcrm churchcrm |
|
Metrics |
cvssV3_1
|
Wed, 19 Feb 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 19 Feb 2025 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability exists in ChurchCRM 5.13.0 that allows an attacker to execute arbitrary JavaScript in a victim's browser via Reflected Cross-Site Scripting (XSS) in the EditEventAttendees.php page. This requires Administration privileges and affects the EID parameter. The flaw allows an attacker to steal session cookies, perform actions on behalf of an authenticated user, and gain unauthorized access to the application. | |
Title | Session Hijacking via Reflected Cross-Site Scripting (XSS) in ChurchCRM EditEventAttendees.php EID Parameter | |
Weaknesses | CWE-287 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Gridware
Published:
Updated: 2025-02-19T19:40:43.255Z
Reserved: 2025-02-04T10:31:53.126Z
Link: CVE-2025-1024

Updated: 2025-02-19T19:40:31.852Z

Status : Analyzed
Published: 2025-02-19T09:15:10.280
Modified: 2025-02-25T21:50:07.637
Link: CVE-2025-1024

No data.

No data.