Impact
The flaw exists in the validate input routine for the custom query argument within the Query Viewer component of Ecclesia CRM. An attacker can supply crafted input in the custom parameter of the /v2/query/view/ endpoint, causing user‑supplied data to be inserted unchecked into an SQL statement. This lack of proper input validation leads to a classic SQL injection weakness (CWE‑74 and CWE‑89) that can allow compromise of the underlying database, unauthorized disclosure of sensitive information, and potentially further exploitation of the application.
Affected Systems
All installations of phili67 Ecclesia CRM version 8.0.0 or earlier are affected. The vulnerability resides in the Query Viewer Component accessed via the /v2/query/view/ API endpoint. No higher or lower version indications are available, so all releases up to 8.0.0 are presumed vulnerable.
Risk and Exploitability
With a CVSS score of 5.3 the vulnerability is moderate in severity. The EPSS score is not available, and the issue is not listed in the CISA KEV catalog. The attack can be launched remotely over HTTP or HTTPS by supplying malicious content in the custom query parameter, and published exploit code exists. Given the remote nature and potential data exposure, the risk is non‑negligible and warrants prompt attention.
OpenCVE Enrichment