Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

churchcrm

About This Vendor

churchcrm is a technology vendor producing software and infrastructure products. As a software provider, churchcrm's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of churchcrm's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 80 known vulnerabilities from churchcrm. This includes 9 critical-severity issues and 35 high-severity issues that represent significant risk. These vulnerabilities affect 1 distinct product across churchcrm's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2022 through 2026, with recent active disclosure activity. Organizations deploying churchcrm products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2021-41965 2022-05-15 2024-11-21 8.8 6.5 Likely
CVE-2022-31325 2022-06-08 2024-11-21 7.2 6.5 Likely
CVE-2022-36136 2022-11-29 2025-04-25 4.8 - -
CVE-2022-36137 2022-11-29 2025-04-25 4.8 - -
CVE-2023-24684 2023-02-09 2025-03-24 7.2 - -
CVE-2023-24685 2023-02-09 2025-03-24 7.2 - -
CVE-2023-24686 2023-02-09 2025-03-24 4.8 - -
CVE-2023-24690 2023-02-09 2025-03-24 5.4 - -
CVE-2023-27059 2023-03-16 2025-02-26 5.4 - -
CVE-2023-26855 2023-04-04 2025-02-13 7.5 - -
CVE-2023-25346 2023-04-25 2025-02-03 6.1 - -
CVE-2023-25347 2023-04-25 2025-02-04 5.4 - -
CVE-2023-25348 2023-04-25 2025-02-04 7.8 - -
CVE-2023-26839 2023-04-25 2025-02-04 4.3 - -
CVE-2023-26840 2023-04-25 2025-02-03 5.3 - -
CVE-2023-26841 2023-04-25 2025-02-03 6.5 - -
CVE-2023-26843 2023-04-25 2025-02-04 5.4 - -
CVE-2023-29842 2023-05-04 2025-01-29 8.8 - -
CVE-2023-31699 2023-05-17 2025-01-22 4.8 - -
CVE-2023-26842 2023-05-31 2025-01-09 5.4 - -
CVE-2023-31548 2023-05-31 2025-01-10 5.4 - -
CVE-2023-33661 2023-06-29 2024-11-21 6.1 - -
CVE-2023-38760 2023-08-08 2024-11-21 7.5 - -
CVE-2023-38761 2023-08-08 2024-11-21 6.1 - -
CVE-2023-38762 2023-08-08 2024-11-21 7.5 - -
CVE-2023-38763 2023-08-08 2024-11-21 6.5 - -
CVE-2023-38764 2023-08-08 2024-11-21 7.5 - -
CVE-2023-38765 2023-08-08 2024-11-21 7.5 - -
CVE-2023-38766 2023-08-08 2024-11-21 5.4 - -
CVE-2023-38767 2023-08-08 2024-11-21 7.5 - -
CVE-2023-38768 2023-08-08 2024-11-21 7.5 - -
CVE-2023-38769 2023-08-08 2024-11-21 7.5 - -
CVE-2023-38770 2023-08-08 2024-11-21 7.5 - -
CVE-2023-38771 2023-08-08 2024-11-21 7.5 - -
CVE-2023-38773 2023-08-08 2024-11-21 7.5 - -
CVE-2020-28848 2023-08-11 2024-11-21 8.8 - -
CVE-2020-28849 2023-08-11 2024-11-21 5.4 - -
CVE-2024-25891 2024-02-21 2025-03-17 7.5 - -
CVE-2024-25892 2024-02-21 2025-03-17 8.1 - -
CVE-2024-25893 2024-02-21 2025-03-17 9.1 - -
CVE-2024-25894 2024-02-21 2025-03-17 9.8 - -
CVE-2024-25895 2024-02-21 2025-03-17 6.1 - -
CVE-2024-25896 2024-02-21 2025-03-17 5.3 - -
CVE-2024-25897 2024-02-21 2025-03-17 9.8 - -
CVE-2024-25898 2024-02-21 2025-03-28 6.1 - -
CVE-2024-36647 2024-06-13 2025-12-18 5.4 - -
CVE-2024-39304 2024-07-26 2024-11-21 8.8 - -
CVE-2024-53438 2024-11-22 2025-03-28 9.8 - -
CVE-2025-0981 2025-02-18 2025-02-21 6.1 - -
CVE-2025-1023 2025-02-18 2025-02-21 9.8 - -
CVE-2025-1024 2025-02-19 2025-02-25 4.8 - -
CVE-2025-1132 2025-02-19 2025-02-25 8.8 - -
CVE-2025-1133 2025-02-19 2025-02-25 7.2 - -
CVE-2025-1134 2025-02-19 2025-02-25 7.2 - -
CVE-2025-1135 2025-02-19 2025-02-25 7.2 - -
CVE-2025-3954 2025-04-26 2025-05-29 3.7 2.6 Unknown
CVE-2025-11529 2025-10-09 2026-02-24 7.3 7.5 Likely
CVE-2025-11938 2025-10-19 2026-02-24 5.6 5.1 Unknown
CVE-2025-11939 2025-10-19 2026-02-24 4.7 5.8 Unknown
CVE-2025-66313 2025-12-01 2025-12-03 7.2 - -
CVE-2025-67751 2025-12-16 2025-12-17 7.2 - -
CVE-2025-67874 2025-12-16 2025-12-17 6.5 - -
CVE-2025-62521 2025-12-17 2025-12-18 10.0 - -
CVE-2025-66395 2025-12-17 2025-12-18 8.8 - -
CVE-2025-66396 2025-12-17 2025-12-18 7.2 - -
CVE-2025-66397 2025-12-17 2025-12-18 8.3 - -
CVE-2025-67875 2025-12-17 2025-12-18 5.4 - -
CVE-2025-67876 2025-12-17 2025-12-18 5.4 - -
CVE-2025-67877 2025-12-17 2025-12-18 8.8 - -
CVE-2025-68109 2025-12-17 2025-12-18 9.1 - -
CVE-2025-68110 2025-12-17 2025-12-18 9.9 - -
CVE-2025-68111 2025-12-17 2025-12-18 7.2 - -
CVE-2025-68112 2025-12-17 2025-12-18 9.6 - -
CVE-2025-68275 2025-12-17 2025-12-18 4.8 - -
CVE-2025-68399 2025-12-17 2025-12-18 5.4 - -
CVE-2025-68400 2025-12-17 2025-12-18 8.8 - -
CVE-2025-68401 2025-12-17 2025-12-18 4.8 - -
CVE-2026-24854 2026-01-30 2026-02-17 8.8 - -
CVE-2026-24855 2026-01-30 2026-02-17 5.4 - -
CVE-2026-26059 2026-02-19 2026-02-20 5.4 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for churchcrm by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with churchcrm's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.