ChurchInfo contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the ListEvents.php script not properly sanitizing user-supplied input to the 'WhichType' parameter. This may allow an attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data.
Remote / Network Access
Loss of Confidentiality,
Loss of Integrity
Patch / RCS
Currently, there are no known workarounds or upgrades to correct this issue. However, ChurchInfo has released a patch to address this vulnerability. Check the vendor solution in the references section.