{"uuid": "91d84920-dbc7-443a-9a1d-db7f2e7a5114", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1023", "type": "seen", "source": "https://t.me/cvedetector/18323", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1023 - ChurchCRM SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1023 \nPublished : Feb. 18, 2025, 10:15 a.m. | 1\u00a0hour, 18\u00a0minutes ago \nDescription : A vulnerability exists in ChurchCRM\u00a05.13.0 and prior\u00a0that allows an attacker to execute arbitrary SQL queries by exploiting a time-based blind SQL Injection\u00a0vulnerability in the EditEventTypes\u00a0functionality. The newCountName\u00a0parameter is directly concatenated into an SQL query without proper sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to data exfiltration, modification, or deletion. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-18T12:38:15.000000Z"}