{"uuid": "22798900-a049-4c17-ae5a-e35421bf2b26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1133", "type": "seen", "source": "https://t.me/cvedetector/18417", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1133 - ChurchCRM SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1133 \nPublished : Feb. 19, 2025, 9:15 a.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : A vulnerability exists in ChurchCRM 5.13.0 and prior\u00a0that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based blind SQL Injection\u00a0vulnerability in the EditEventAttendees\u00a0functionality. The EID\u00a0parameter is directly concatenated into an SQL query without proper sanitization, making it susceptible to SQL injection attacks. An attacker can manipulate the query, potentially leading to data exfiltration, modification, or deletion.\u00a0 Please note that this vulnerability requires Administrator privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-19T12:03:02.000000Z"}