<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-34402 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-34402/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 06 Apr 2026 16:16:35 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-34402/feed.xml" rel="self" type="application/rss+xml"/><item><title>ChurchCRM Time-Based Blind SQL Injection Vulnerability (CVE-2026-34402)</title><link>https://feed.craftedsignal.io/briefs/2026-04-churchcrm-sql-injection/</link><pubDate>Mon, 06 Apr 2026 16:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-churchcrm-sql-injection/</guid><description>CVE-2026-34402 is a time-based blind SQL injection vulnerability in ChurchCRM versions prior to 7.1.0. Authenticated users with Edit Records or Manage Groups permissions can exploit the PropertyAssign.php endpoint to exfiltrate or modify database content, including user credentials, PII, and configuration secrets.</description><content:encoded><![CDATA[<p>ChurchCRM is an open-source church management system. Prior to version 7.1.0, the application suffers from a time-based blind SQL injection vulnerability (CVE-2026-34402). Authenticated users with either &ldquo;Edit Records&rdquo; or &ldquo;Manage Groups&rdquo; permissions can exploit this flaw. Successful exploitation allows attackers to exfiltrate or modify any database content, which could include user credentials, personally identifiable information (PII), and configuration secrets. The vulnerable endpoint is <code>PropertyAssign.php</code>. This vulnerability was addressed and fixed in version 7.1.0 of ChurchCRM. Defenders should prioritize patching vulnerable instances to prevent unauthorized access and data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains valid credentials for ChurchCRM, with &ldquo;Edit Records&rdquo; or &ldquo;Manage Groups&rdquo; permissions. This could be achieved through credential stuffing, password reuse, or other means.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>PropertyAssign.php</code> endpoint. This request contains a SQL injection payload within a parameter processed by the application.</li>
<li>The application processes the malicious SQL query, injecting it into the database query without proper sanitization.</li>
<li>Due to the blind nature of the SQL injection, the attacker uses time-based techniques (e.g., <code>SLEEP()</code>) to infer information about the database structure and content.</li>
<li>The attacker iterates through various SQL injection payloads, slowly extracting sensitive data such as usernames, password hashes, and other PII.</li>
<li>The attacker may modify database records to escalate privileges, create new administrative accounts, or sabotage the application&rsquo;s functionality.</li>
<li>The attacker exfiltrates the stolen data.</li>
<li>The final objective is to compromise the confidentiality, integrity, and availability of the ChurchCRM database, potentially leading to significant data breaches and reputational damage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34402 can have serious consequences. An attacker can gain unauthorized access to sensitive data stored within the ChurchCRM database. This includes user credentials, PII, and configuration secrets. The attacker can also modify database records, potentially disrupting church operations or causing financial harm. Given the sensitive nature of the data often stored in church management systems, the impact of this vulnerability could be substantial. The vulnerability affects ChurchCRM installations prior to version 7.1.0.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade ChurchCRM installations to version 7.1.0 or later to remediate CVE-2026-34402.</li>
<li>Deploy the Sigma rule detecting requests to PropertyAssign.php with sleep commands to your SIEM and tune for your environment.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>PropertyAssign.php</code> endpoint.</li>
<li>Implement web application firewall (WAF) rules to block SQL injection attempts.</li>
<li>Review user access controls within ChurchCRM to ensure that only authorized personnel have &ldquo;Edit Records&rdquo; or &ldquo;Manage Groups&rdquo; permissions.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqlinjection</category><category>cve-2026-34402</category><category>churchcrm</category><category>webserver</category></item></channel></rss>