ChurchCRM SQL Injection Vulnerability (CVE-2026-35567)
ChurchCRM versions prior to 7.1.0 are vulnerable to SQL injection via the NewRole POST parameter, allowing authenticated users with the ManageGroups role to execute arbitrary SQL commands.
ChurchCRM, an open-source church management system, is susceptible to SQL injection attacks in versions prior to 7.1.0. The vulnerability, identified as CVE-2026-35567, resides in the src/MemberRoleChange.php file, specifically within the NewRole POST parameter. Exploitation requires an attacker to have an authenticated session with the ManageGroups role, along with knowledge of valid GroupID and PersonID values, which can be obtained from the GroupView or PersonView pages. Successful exploitation can lead to unauthorized data access, modification, or deletion within the ChurchCRM database. The vulnerability is resolved in ChurchCRM version 7.1.0.
Attack Chain
- Attacker gains authenticated access to ChurchCRM with a user account possessing the
ManageGroupsrole. - Attacker identifies valid
GroupIDandPersonIDvalues by browsing theGroupVieworPersonViewpages. - Attacker crafts a malicious HTTP POST request targeting
src/MemberRoleChange.php. - The POST request includes the
NewRoleparameter containing a crafted SQL injection payload, exploiting the lack of proper integer validation. - The application executes the SQL query incorporating the injected payload.
- The attacker retrieves sensitive data from the database, modifies existing data, or injects malicious data.
- The attacker could leverage the SQL injection to create a new administrative user.
- The attacker uses the new administrative account to take complete control of the ChurchCRM instance.
Impact
Successful exploitation of this SQL injection vulnerability (CVE-2026-35567) in ChurchCRM can result in the complete compromise of the application’s database. An attacker can gain unauthorized access to sensitive church member data, including personally identifiable information (PII). This can lead to data breaches, identity theft, and financial fraud. Malicious actors could also modify or delete data, disrupting church operations and potentially causing reputational damage. The impact is critical, especially considering the sensitive nature of the data managed by ChurchCRM.
Recommendation
- Upgrade ChurchCRM installations to version 7.1.0 or later to remediate the SQL injection vulnerability (CVE-2026-35567).
- Deploy the provided Sigma rule to detect suspicious POST requests to
src/MemberRoleChange.phpcontaining potential SQL injection attempts. - Monitor web server logs for unusual activity related to
MemberRoleChange.php, especially concerning theNewRoleparameter (webserver log source). - Implement input validation and sanitization measures for all user-supplied data, focusing on integer validation for parameters like
NewRole.
Detection coverage 2
Detect Suspicious POST Requests to MemberRoleChange.php with SQL Injection Patterns
highDetects POST requests to MemberRoleChange.php with SQL injection patterns in the NewRole parameter.
Detect Authentication Attempts with SQL Injection Payloads
highDetects authentication attempts to ChurchCRM with SQL injection payloads in login parameters.
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
1
1
url
| Type | Value |
|---|---|
| url | https://github.com/ChurchCRM/CRM/security/advisories/GHSA-5f97-jgg4-gqwr |
| [email protected] |