<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-35567 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-35567/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 07 Apr 2026 16:16:29 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-35567/feed.xml" rel="self" type="application/rss+xml"/><item><title>ChurchCRM SQL Injection Vulnerability (CVE-2026-35567)</title><link>https://feed.craftedsignal.io/briefs/2026-04-churchcrm-sqli/</link><pubDate>Tue, 07 Apr 2026 16:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-churchcrm-sqli/</guid><description>ChurchCRM versions prior to 7.1.0 are vulnerable to SQL injection via the NewRole POST parameter, allowing authenticated users with the ManageGroups role to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>ChurchCRM, an open-source church management system, is susceptible to SQL injection attacks in versions prior to 7.1.0. The vulnerability, identified as CVE-2026-35567, resides in the <code>src/MemberRoleChange.php</code> file, specifically within the <code>NewRole</code> POST parameter. Exploitation requires an attacker to have an authenticated session with the <code>ManageGroups</code> role, along with knowledge of valid <code>GroupID</code> and <code>PersonID</code> values, which can be obtained from the <code>GroupView</code> or <code>PersonView</code> pages. Successful exploitation can lead to unauthorized data access, modification, or deletion within the ChurchCRM database. The vulnerability is resolved in ChurchCRM version 7.1.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains authenticated access to ChurchCRM with a user account possessing the <code>ManageGroups</code> role.</li>
<li>Attacker identifies valid <code>GroupID</code> and <code>PersonID</code> values by browsing the <code>GroupView</code> or <code>PersonView</code> pages.</li>
<li>Attacker crafts a malicious HTTP POST request targeting <code>src/MemberRoleChange.php</code>.</li>
<li>The POST request includes the <code>NewRole</code> parameter containing a crafted SQL injection payload, exploiting the lack of proper integer validation.</li>
<li>The application executes the SQL query incorporating the injected payload.</li>
<li>The attacker retrieves sensitive data from the database, modifies existing data, or injects malicious data.</li>
<li>The attacker could leverage the SQL injection to create a new administrative user.</li>
<li>The attacker uses the new administrative account to take complete control of the ChurchCRM instance.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-35567) in ChurchCRM can result in the complete compromise of the application&rsquo;s database. An attacker can gain unauthorized access to sensitive church member data, including personally identifiable information (PII). This can lead to data breaches, identity theft, and financial fraud. Malicious actors could also modify or delete data, disrupting church operations and potentially causing reputational damage. The impact is critical, especially considering the sensitive nature of the data managed by ChurchCRM.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade ChurchCRM installations to version 7.1.0 or later to remediate the SQL injection vulnerability (CVE-2026-35567).</li>
<li>Deploy the provided Sigma rule to detect suspicious POST requests to <code>src/MemberRoleChange.php</code> containing potential SQL injection attempts.</li>
<li>Monitor web server logs for unusual activity related to <code>MemberRoleChange.php</code>, especially concerning the <code>NewRole</code> parameter (webserver log source).</li>
<li>Implement input validation and sanitization measures for all user-supplied data, focusing on integer validation for parameters like <code>NewRole</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-35567</category><category>sql-injection</category><category>churchcrm</category></item></channel></rss>