<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Churchcrm — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/churchcrm/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 08 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/churchcrm/feed.xml" rel="self" type="application/rss+xml"/><item><title>ChurchCRM Stored XSS Vulnerability in Person Property Management</title><link>https://feed.craftedsignal.io/briefs/2026-04-churchcrm-xss/</link><pubDate>Wed, 08 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-churchcrm-xss/</guid><description>A stored cross-site scripting (XSS) vulnerability in ChurchCRM versions prior to 7.0.0 allows authenticated users to inject arbitrary JavaScript code via dynamically assigned person properties, leading to potential session hijacking or account compromise when other users view the affected profile.</description><content:encoded><![CDATA[<p>ChurchCRM, an open-source church management system, is vulnerable to a stored cross-site scripting (XSS) attack affecting versions prior to 7.0.0. This vulnerability resides within the Person Property Management subsystem and stems from insufficient input sanitization when handling dynamically assigned person properties. An authenticated attacker can inject malicious JavaScript code, which is then persistently stored in the database. When other users view the compromised person&rsquo;s profile or access the printable view of that profile, the injected script executes, potentially leading to session hijacking or complete account takeover. This issue impacts versions patched for CVE-2023-38766, highlighting a persistent weakness. Organizations using vulnerable versions of ChurchCRM are at risk of unauthorized access and data breaches. Users are advised to update to version 7.0.0 or later to remediate this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to ChurchCRM with valid user credentials.</li>
<li>Attacker navigates to the Person Property Management section.</li>
<li>Attacker creates or modifies a dynamically assigned person property, injecting malicious JavaScript code into a property field. Example payload: <code>&lt;script&gt;alert(&quot;XSS&quot;)&lt;/script&gt;</code>.</li>
<li>The application stores the malicious payload in the database without proper sanitization.</li>
<li>A different user views the profile of the person with the compromised property.</li>
<li>The stored XSS payload is rendered within the user&rsquo;s browser, executing the injected JavaScript code.</li>
<li>The attacker&rsquo;s JavaScript code steals the user&rsquo;s session cookie or redirects the user to a phishing page.</li>
<li>The attacker uses the stolen session cookie to hijack the user&rsquo;s session and gain unauthorized access to the application, potentially escalating privileges and accessing sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this stored XSS vulnerability can lead to session hijacking and full account compromise. Attackers could gain unauthorized access to sensitive church member data, modify records, or perform administrative functions within the ChurchCRM system. The impact ranges from data theft and privacy breaches to complete disruption of church management operations. Given the potential for widespread access to sensitive personal information, organizations are strongly advised to apply the necessary updates to mitigate this risk. The CVSS v3.1 base score for this vulnerability is 8.7, indicating a high severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade ChurchCRM to version 7.0.0 or later to patch the vulnerability (CVE-2026-35576).</li>
<li>Deploy the provided Sigma rule to detect potential XSS attempts via crafted property values.</li>
<li>Review and audit existing dynamically assigned person properties for suspicious script tags to identify potentially compromised records.</li>
<li>Implement input validation and output encoding to prevent future XSS vulnerabilities in ChurchCRM.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xss</category><category>web-application</category><category>churchcrm</category></item><item><title>ChurchCRM Pre-Authentication Remote Code Execution Vulnerability (CVE-2026-39337)</title><link>https://feed.craftedsignal.io/briefs/2026-04-churchcrm-rce/</link><pubDate>Tue, 07 Apr 2026 18:16:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-churchcrm-rce/</guid><description>A critical pre-authentication remote code execution vulnerability in ChurchCRM versions prior to 7.1.0 allows unauthenticated attackers to inject arbitrary PHP code during the initial installation process, leading to complete server compromise.</description><content:encoded><![CDATA[<p>ChurchCRM, an open-source church management system, is vulnerable to a critical pre-authentication remote code execution (RCE) flaw, identified as CVE-2026-39337. This vulnerability affects versions prior to 7.1.0. Unauthenticated attackers can exploit the setup wizard during the initial installation process to inject arbitrary PHP code, leading to complete server compromise. The root cause lies in the insufficient sanitization of the &ldquo;$dbPassword&rdquo; variable. This vulnerability is a result of an incomplete fix for a previous vulnerability, CVE-2025-62521. Organizations using vulnerable versions of ChurchCRM are at risk of unauthorized access, data breaches, and complete system takeover. Upgrading to version 7.1.0 or later is strongly advised to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a malicious HTTP request to the ChurchCRM setup wizard.</li>
<li>The malicious request injects arbitrary PHP code into the <code>$dbPassword</code> variable during the setup process.</li>
<li>Due to insufficient sanitization, the injected PHP code is written to the ChurchCRM configuration file.</li>
<li>The attacker triggers the execution of the configuration file, executing the injected PHP code.</li>
<li>The attacker gains arbitrary code execution on the web server.</li>
<li>The attacker escalates privileges to gain full control of the server.</li>
<li>The attacker installs a persistent backdoor for continued access.</li>
<li>The attacker may then exfiltrate sensitive data or deploy ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39337 allows an unauthenticated attacker to achieve complete server compromise. This could result in the theft of sensitive church member data, modification or destruction of data, defacement of the ChurchCRM website, or use of the server as a platform for launching further attacks. Given the critical nature of the vulnerability and the ease of exploitation, organizations are at high risk. The number of potential victims is high considering the wide usage of this CRM.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade ChurchCRM to version 7.1.0 or later to patch CVE-2026-39337.</li>
<li>Monitor web server logs for suspicious activity related to the ChurchCRM setup wizard. Deploy a Sigma rule to detect suspicious POST requests to the install endpoint.</li>
<li>Implement strong input validation and sanitization for all user-supplied data, especially during the installation process.</li>
<li>Review and harden the web server configuration to prevent unauthorized code execution.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>cve-2026-39337</category><category>churchcrm</category></item><item><title>ChurchCRM Authenticated API User Authorization Bypass (CVE-2026-39331)</title><link>https://feed.craftedsignal.io/briefs/2026-04-churchcrm-auth-bypass/</link><pubDate>Tue, 07 Apr 2026 18:16:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-churchcrm-auth-bypass/</guid><description>An authenticated API user of ChurchCRM prior to v7.1.0 can bypass authorization checks and modify arbitrary family records by manipulating the familyId parameter in API requests, leading to privilege escalation and potential data manipulation.</description><content:encoded><![CDATA[<p>ChurchCRM is an open-source church management system. Prior to version 7.1.0, a critical vulnerability exists (CVE-2026-39331) that allows authenticated API users to bypass authorization controls and modify family records without proper privileges. This is achieved by manipulating the <code>{familyId}</code> parameter in specific API requests. The vulnerability lies in the absence of role-based access control on several key API endpoints, including <code>/family/{familyId}/verify</code>, <code>/family/{familyId}/verify/url</code>, <code>/family/{familyId}/verify/now</code>, <code>/family/{familyId}/activate/{status}</code>, and <code>/family/{familyId}/geocode</code>. This allows attackers to deactivate/reactivate families, spam verification emails, mark families as verified, and trigger geocoding actions without the necessary permissions. This vulnerability poses a significant risk to the integrity and availability of ChurchCRM data, especially in multi-tenant environments. Upgrade to version 7.1.0 to remediate this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the ChurchCRM API with valid user credentials.</li>
<li>The attacker identifies a target <code>familyId</code> that they do not have explicit modification rights for.</li>
<li>The attacker crafts a malicious API request to one of the vulnerable endpoints: <code>/family/{familyId}/verify</code>, <code>/family/{familyId}/verify/url</code>, <code>/family/{familyId}/verify/now</code>, <code>/family/{familyId}/activate/{status}</code>, or <code>/family/{familyId}/geocode</code>.</li>
<li>The attacker replaces the <code>{familyId}</code> parameter in the request URL with the target <code>familyId</code>.</li>
<li>For example, the attacker sends a POST request to <code>/family/123/activate/false</code> to deactivate family with ID 123.</li>
<li>Due to the lack of role-based access control, the server processes the request without verifying if the attacker has the necessary <code>EditRecords</code> privilege.</li>
<li>The target family&rsquo;s state is modified (e.g., deactivated, marked as verified).</li>
<li>The attacker repeats this process for other families and actions, potentially causing widespread disruption or data manipulation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39331 allows an attacker to escalate privileges and manipulate sensitive family data within ChurchCRM. This can lead to unauthorized deactivation of families, generation of spam verification emails, inaccurate family verification status, and resource exhaustion due to excessive geocoding requests. While specific victim counts are unknown, all ChurchCRM instances prior to version 7.1.0 are vulnerable. The consequences include reputational damage, data integrity issues, and potential disruption of church operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade ChurchCRM to version 7.1.0 to patch CVE-2026-39331 and address the authorization bypass vulnerability.</li>
<li>Monitor web server logs for suspicious requests to the vulnerable API endpoints (<code>/family/{familyId}/verify</code>, <code>/family/{familyId}/verify/url</code>, <code>/family/{familyId}/verify/now</code>, <code>/family/{familyId}/activate/{status}</code>, <code>/family/{familyId}/geocode</code>) as detected by the Sigma rule &ldquo;ChurchCRM Family ID Manipulation&rdquo;.</li>
<li>Implement stricter input validation and role-based access controls on all API endpoints to prevent unauthorized data modification, especially those handling sensitive data like family records.</li>
<li>Review and audit existing ChurchCRM user permissions to identify and revoke any unnecessary privileges that could be exploited in conjunction with this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-39331</category><category>churchcrm</category><category>authorization-bypass</category><category>privilege-escalation</category><category>web-application</category></item><item><title>ChurchCRM Path Traversal Vulnerability Leading to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-churchcrm-traversal/</link><pubDate>Tue, 07 Apr 2026 18:16:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-churchcrm-traversal/</guid><description>A path traversal vulnerability in ChurchCRM versions prior to 6.5.3 allows authenticated administrators to upload arbitrary files, leading to remote code execution by overwriting Apache .htaccess files.</description><content:encoded><![CDATA[<p>ChurchCRM, an open-source church management system, is vulnerable to a path traversal attack affecting versions prior to 6.5.3. This vulnerability resides in the backup restore functionality, specifically within <code>src/ChurchCRM/Backup/RestoreJob.php</code>. Authenticated administrators can exploit this flaw by manipulating the <code>$rawUploadedFile['name']</code> parameter, which lacks proper sanitization. This allows for the upload of arbitrary files with attacker-controlled names to the <code>/var/www/html/tmp_attach/ChurchCRMBackups/</code> directory. Successful exploitation leads to remote code execution via overwriting Apache&rsquo;s <code>.htaccess</code> configuration files, effectively compromising the web server. Organizations using vulnerable versions of ChurchCRM are at risk of unauthorized access and control of their systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated administrator logs into the ChurchCRM application.</li>
<li>The administrator navigates to the backup restore functionality.</li>
<li>The attacker crafts a malicious backup archive containing a crafted <code>.htaccess</code> file.</li>
<li>The attacker uploads the malicious backup archive via the restore functionality, exploiting the path traversal vulnerability in <code>src/ChurchCRM/Backup/RestoreJob.php</code>. The <code>$rawUploadedFile['name']</code> parameter is manipulated to control the file&rsquo;s destination.</li>
<li>The malicious <code>.htaccess</code> file is written to the web server&rsquo;s document root or a sensitive directory, such as <code>/var/www/html/</code>.</li>
<li>The overwritten <code>.htaccess</code> file modifies the Apache web server&rsquo;s configuration, potentially enabling PHP execution for arbitrary file types or redirecting requests to attacker-controlled scripts.</li>
<li>The attacker accesses a file (e.g., an image or text file) which is now parsed as PHP code due to the malicious <code>.htaccess</code> configuration.</li>
<li>The attacker executes arbitrary code on the server, gaining remote code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to gain complete control of the ChurchCRM web server. This can lead to data breaches, defacement of the website, and the potential to use the compromised server as a launchpad for further attacks within the network. Given the sensitive nature of data often stored in ChurchCRM systems (e.g., personal contact information, financial records), the compromise can have severe consequences for both the organization and its members. While the exact number of vulnerable installations is unknown, the widespread use of ChurchCRM makes this a significant threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade ChurchCRM to version 6.5.3 or later to patch the vulnerability described in CVE-2026-35573.</li>
<li>Implement strict file upload validation and sanitization to prevent path traversal vulnerabilities in other web applications.</li>
<li>Monitor web server logs for suspicious file uploads to <code>/var/www/html/tmp_attach/ChurchCRMBackups/</code> directory, looking for unexpected file extensions using the &ldquo;ChurchCRM Suspicious File Upload&rdquo; Sigma rule.</li>
<li>Implement the &ldquo;ChurchCRM .htaccess File Creation&rdquo; Sigma rule to detect the creation of .htaccess files in web directories.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>rce</category><category>churchcrm</category></item><item><title>ChurchCRM SQL Injection Vulnerability (CVE-2026-35567)</title><link>https://feed.craftedsignal.io/briefs/2026-04-churchcrm-sqli/</link><pubDate>Tue, 07 Apr 2026 16:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-churchcrm-sqli/</guid><description>ChurchCRM versions prior to 7.1.0 are vulnerable to SQL injection via the NewRole POST parameter, allowing authenticated users with the ManageGroups role to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>ChurchCRM, an open-source church management system, is susceptible to SQL injection attacks in versions prior to 7.1.0. The vulnerability, identified as CVE-2026-35567, resides in the <code>src/MemberRoleChange.php</code> file, specifically within the <code>NewRole</code> POST parameter. Exploitation requires an attacker to have an authenticated session with the <code>ManageGroups</code> role, along with knowledge of valid <code>GroupID</code> and <code>PersonID</code> values, which can be obtained from the <code>GroupView</code> or <code>PersonView</code> pages. Successful exploitation can lead to unauthorized data access, modification, or deletion within the ChurchCRM database. The vulnerability is resolved in ChurchCRM version 7.1.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains authenticated access to ChurchCRM with a user account possessing the <code>ManageGroups</code> role.</li>
<li>Attacker identifies valid <code>GroupID</code> and <code>PersonID</code> values by browsing the <code>GroupView</code> or <code>PersonView</code> pages.</li>
<li>Attacker crafts a malicious HTTP POST request targeting <code>src/MemberRoleChange.php</code>.</li>
<li>The POST request includes the <code>NewRole</code> parameter containing a crafted SQL injection payload, exploiting the lack of proper integer validation.</li>
<li>The application executes the SQL query incorporating the injected payload.</li>
<li>The attacker retrieves sensitive data from the database, modifies existing data, or injects malicious data.</li>
<li>The attacker could leverage the SQL injection to create a new administrative user.</li>
<li>The attacker uses the new administrative account to take complete control of the ChurchCRM instance.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-35567) in ChurchCRM can result in the complete compromise of the application&rsquo;s database. An attacker can gain unauthorized access to sensitive church member data, including personally identifiable information (PII). This can lead to data breaches, identity theft, and financial fraud. Malicious actors could also modify or delete data, disrupting church operations and potentially causing reputational damage. The impact is critical, especially considering the sensitive nature of the data managed by ChurchCRM.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade ChurchCRM installations to version 7.1.0 or later to remediate the SQL injection vulnerability (CVE-2026-35567).</li>
<li>Deploy the provided Sigma rule to detect suspicious POST requests to <code>src/MemberRoleChange.php</code> containing potential SQL injection attempts.</li>
<li>Monitor web server logs for unusual activity related to <code>MemberRoleChange.php</code>, especially concerning the <code>NewRole</code> parameter (webserver log source).</li>
<li>Implement input validation and sanitization measures for all user-supplied data, focusing on integer validation for parameters like <code>NewRole</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-35567</category><category>sql-injection</category><category>churchcrm</category></item><item><title>ChurchCRM Time-Based Blind SQL Injection Vulnerability (CVE-2026-34402)</title><link>https://feed.craftedsignal.io/briefs/2026-04-churchcrm-sql-injection/</link><pubDate>Mon, 06 Apr 2026 16:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-churchcrm-sql-injection/</guid><description>CVE-2026-34402 is a time-based blind SQL injection vulnerability in ChurchCRM versions prior to 7.1.0. Authenticated users with Edit Records or Manage Groups permissions can exploit the PropertyAssign.php endpoint to exfiltrate or modify database content, including user credentials, PII, and configuration secrets.</description><content:encoded><![CDATA[<p>ChurchCRM is an open-source church management system. Prior to version 7.1.0, the application suffers from a time-based blind SQL injection vulnerability (CVE-2026-34402). Authenticated users with either &ldquo;Edit Records&rdquo; or &ldquo;Manage Groups&rdquo; permissions can exploit this flaw. Successful exploitation allows attackers to exfiltrate or modify any database content, which could include user credentials, personally identifiable information (PII), and configuration secrets. The vulnerable endpoint is <code>PropertyAssign.php</code>. This vulnerability was addressed and fixed in version 7.1.0 of ChurchCRM. Defenders should prioritize patching vulnerable instances to prevent unauthorized access and data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains valid credentials for ChurchCRM, with &ldquo;Edit Records&rdquo; or &ldquo;Manage Groups&rdquo; permissions. This could be achieved through credential stuffing, password reuse, or other means.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>PropertyAssign.php</code> endpoint. This request contains a SQL injection payload within a parameter processed by the application.</li>
<li>The application processes the malicious SQL query, injecting it into the database query without proper sanitization.</li>
<li>Due to the blind nature of the SQL injection, the attacker uses time-based techniques (e.g., <code>SLEEP()</code>) to infer information about the database structure and content.</li>
<li>The attacker iterates through various SQL injection payloads, slowly extracting sensitive data such as usernames, password hashes, and other PII.</li>
<li>The attacker may modify database records to escalate privileges, create new administrative accounts, or sabotage the application&rsquo;s functionality.</li>
<li>The attacker exfiltrates the stolen data.</li>
<li>The final objective is to compromise the confidentiality, integrity, and availability of the ChurchCRM database, potentially leading to significant data breaches and reputational damage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34402 can have serious consequences. An attacker can gain unauthorized access to sensitive data stored within the ChurchCRM database. This includes user credentials, PII, and configuration secrets. The attacker can also modify database records, potentially disrupting church operations or causing financial harm. Given the sensitive nature of the data often stored in church management systems, the impact of this vulnerability could be substantial. The vulnerability affects ChurchCRM installations prior to version 7.1.0.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade ChurchCRM installations to version 7.1.0 or later to remediate CVE-2026-34402.</li>
<li>Deploy the Sigma rule detecting requests to PropertyAssign.php with sleep commands to your SIEM and tune for your environment.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>PropertyAssign.php</code> endpoint.</li>
<li>Implement web application firewall (WAF) rules to block SQL injection attempts.</li>
<li>Review user access controls within ChurchCRM to ensure that only authorized personnel have &ldquo;Edit Records&rdquo; or &ldquo;Manage Groups&rdquo; permissions.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqlinjection</category><category>cve-2026-34402</category><category>churchcrm</category><category>webserver</category></item></channel></rss>