{"vulnerability": "CVE-2025-1135", "sightings": [{"uuid": "0f0cfef6-fb7b-490e-a1c3-516af2df9e56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1135", "type": "seen", "source": "Telegram/sHN_VsP6a4k7t-JXqRCAha0JmwQvWoRgEzsRij_uBX0-4Vih", "content": "", "creation_timestamp": "2025-02-19T15:39:58.000000Z"}, {"uuid": "19858c8c-dc8a-406e-9262-f6fe594873a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-11350", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3m2lceduubu2i", "content": "", "creation_timestamp": "2025-10-07T04:34:17.267117Z"}, {"uuid": "47fd5041-4c38-4584-9d10-2d183cbe9b0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-11355", "type": "published-proof-of-concept", "source": "Telegram/4pwzrJnceRLyEgpbd6VO8VdJVifSdOcVQ4b7TmcAbl02Blg", "content": "", "creation_timestamp": "2026-01-08T17:13:19.000000Z"}, {"uuid": "4c722e9a-73d5-4935-a848-18276601750f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1135", "type": "seen", "source": "https://t.me/TheDarkWebInformer/12919", "content": "\ud83d\udea8 Critical Security Vulnerability\n\ud83c\udd94 CVE-2025-1132, CVE-2025-1133, CVE-2025-1134, CVE-2025-1135\n\ud83d\udca3 CVSS Score: 9.3, 9.3, 9.3, 9.3\n\ud83d\udcc5 Published Date: 25/02/19\n\u26a0\ufe0f Details: A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based and time-based blind SQL Injection vulnerability in the DonatedItemEditor functionality. The CurrentFundraiser parameter is directly concatenated into an SQL query without sufficient sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to data exfiltration, modification, or deletion. Please note that this vulnerability requires Administrator privileges.\n\nNIST: https://nvd.nist.gov/vuln/detail/CVE-2025-1132\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-1133\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-1134\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-1135", "creation_timestamp": "2025-02-19T17:40:35.000000Z"}, {"uuid": "e7272aa4-6e9d-4524-baa1-15af63fb13f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1135", "type": "published-proof-of-concept", "source": "Telegram/rLhwLXcL8Mn4otgpYmghgpVIj1_d3aqFIFfUfzqDCbnUja0", "content": "", "creation_timestamp": "2025-02-19T11:01:48.000000Z"}, {"uuid": "bda226e0-42cc-465f-8917-5eaf20711cb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1135", "type": "seen", "source": "https://t.me/warmakerz/1093", "content": "\ud83d\udea8 Critical Security Vulnerability\n\ud83d\udfe2 CVE-2025-1132\n\ud83d\udfe2 CVE-2025-1133\n\ud83d\udfe2 CVE-2025-1134\n\ud83d\udfe2 CVE-2025-1135\n\ud83d\udd34 CVSS Score: 9.3, 9.3, 9.3, 9.3\n\u267e Published Date: 25/02/19\n\u26a0\ufe0f Details: A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based and time-based blind SQL Injection vulnerability in the DonatedItemEditor functionality. The CurrentFundraiser parameter is directly concatenated into an SQL query without sufficient sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to data exfiltration, modification, or deletion. Please note that this vulnerability requires Administrator privileges.\n\n\u27a1\ufe0f\u27a1\ufe0f  @WarmakerZ  \u2b05\ufe0f\u2b05\ufe0f", "creation_timestamp": "2025-02-20T07:00:36.000000Z"}, {"uuid": "5d080460-253e-4683-9d29-754dba83f5e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1135", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lijguapvfl2y", "content": "", "creation_timestamp": "2025-02-19T09:15:56.226039Z"}, {"uuid": "bc8ff426-6d27-4062-b230-0383dc49e156", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1135", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lijq3wkkwf2a", "content": "", "creation_timestamp": "2025-02-19T12:01:19.291847Z"}, {"uuid": "1bc8d2c9-62f0-4b6c-9e61-56129a140158", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-11356", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3m2lmeckcil26", "content": "", "creation_timestamp": "2025-10-07T07:33:13.455382Z"}, {"uuid": "a5063608-31b8-4923-89bb-2be53b429ee9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-11350", "type": "seen", "source": "https://gist.github.com/Darkcrai86/147e49a4d09b106c2cd5d828c23a35b3", "content": "", "creation_timestamp": "2025-10-07T07:43:34.000000Z"}, {"uuid": "31a4a582-3ed6-41ed-9a5d-74e12f93c728", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1135", "type": "seen", "source": "https://t.me/cvedetector/18418", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1135 - ChurchCRM SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1135 \nPublished : Feb. 19, 2025, 9:15 a.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : A vulnerability exists in ChurchCRM\u00a05.13.0. and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based and time-based blind SQL Injection\u00a0vulnerability in the BatchWinnerEntry\u00a0functionality. The CurrentFundraiser\u00a0parameter is directly concatenated into an SQL query without sufficient sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to data exfiltration, modification, or deletion.\u00a0Please note the vulnerability requires Administrator privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-19T12:03:03.000000Z"}, {"uuid": "aba938d9-d0a8-412f-9608-d10f89a06eaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-11357", "type": "seen", "source": "https://gist.github.com/Darkcrai86/01fcf7cb441ca20fae65f3089dbade0e", "content": "", "creation_timestamp": "2025-10-07T09:45:11.000000Z"}, {"uuid": "76f7ac56-e545-4e71-80ad-e8feecbdffbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-11355", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115333195472561898", "content": "", "creation_timestamp": "2025-10-07T13:48:22.630968Z"}, {"uuid": "7327944e-a534-48f4-bed5-b0031680fc8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-11356", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115333195472561898", "content": "", "creation_timestamp": "2025-10-07T13:48:22.724566Z"}]}