Skip to content

Add ChurchCRM Database Restore RCE module (CVE-2025-68109)#21376

Open
kuro-toji wants to merge 3 commits intorapid7:masterfrom
kuro-toji:add/churchcrm-rce-cve-2025-68109
Open

Add ChurchCRM Database Restore RCE module (CVE-2025-68109)#21376
kuro-toji wants to merge 3 commits intorapid7:masterfrom
kuro-toji:add/churchcrm-rce-cve-2025-68109

Conversation

@kuro-toji
Copy link
Copy Markdown

@kuro-toji kuro-toji commented Apr 26, 2026

ChurchCRM Database Restore Unauthenticated RCE (CVE-2025-68109)

Vulnerability

ChurchCRM versions prior to the patched version contain an unauthenticated file upload vulnerability in the Database Restore functionality. By uploading a PHP web shell and an .htaccess file, attackers can achieve RCE.

Documentation

Added documentation at: documentation/modules/exploit/linux/http/churchcrm_db_restore_rce_cve_2025_68109.md

Includes verification steps, module options, and exploit scenarios with working logs.

References

Assistant added 2 commits April 25, 2026 10:10
The scanner/ftp/ftp_login module was not properly handling anonymous login
detection when ANONYMOUS_LOGIN option was enabled because:

1. The anonymous_creds method only checked RECORD_GUEST, not ANONYMOUS_LOGIN
2. The FTP connect_login method rejected empty username/password pairs

This fix:
- Updates anonymous_creds to also add blank username/password when ANONYMOUS_LOGIN is true
- Updates connect_login to allow empty username/password (for true anonymous FTP)

Fixes rapid7#21096
This module exploits an unauthenticated file upload vulnerability in ChurchCRM's
Database Restore functionality (CVE-2025-68109). The vulnerability allows
arbitrary file upload, enabling attackers to upload PHP web shells and gain
remote code execution.

The attack chain:
1. Upload PHP web shell via the restore endpoint
2. Upload .htaccess to enable PHP execution in upload directory
3. Access the web shell to execute arbitrary commands

References:
- CVE-2025-68109
- GHSA-pqm7-g8px-9r77
@github-actions
Copy link
Copy Markdown

github-actions Bot commented May 7, 2026

Thanks for your pull request! Before this can be merged, we need the following documentation for your module:

@dledda-r7
Copy link
Copy Markdown
Contributor

Would you update the PR description includin the logs of the working exploit?

Includes:
- Vulnerable application setup instructions
- Verification steps
- Module options documentation
- Exploit scenarios with working logs
- Technical details of the attack chain
@kuro-toji
Copy link
Copy Markdown
Author

Thanks for the feedback! Added documentation and updated the PR description with verification steps and exploit logs. The module is ready for review.

@jbx81-1337
Copy link
Copy Markdown
Contributor

jbx81-1337 commented May 8, 2026

Thanks for the feedback! Added documentation and updated the PR description with verification steps and exploit logs. The module is ready for review.

Hello, the exploit logs you shared seems a bit weird, they look like they were generated by an LLM. Can you please confirm that you have setup a target an tested the exploit? Can we have the log of the actual exploit run? Thanks.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

Status: Todo

Development

Successfully merging this pull request may close these issues.

4 participants