<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-39337 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-39337/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 07 Apr 2026 18:16:45 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-39337/feed.xml" rel="self" type="application/rss+xml"/><item><title>ChurchCRM Pre-Authentication Remote Code Execution Vulnerability (CVE-2026-39337)</title><link>https://feed.craftedsignal.io/briefs/2026-04-churchcrm-rce/</link><pubDate>Tue, 07 Apr 2026 18:16:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-churchcrm-rce/</guid><description>A critical pre-authentication remote code execution vulnerability in ChurchCRM versions prior to 7.1.0 allows unauthenticated attackers to inject arbitrary PHP code during the initial installation process, leading to complete server compromise.</description><content:encoded><![CDATA[<p>ChurchCRM, an open-source church management system, is vulnerable to a critical pre-authentication remote code execution (RCE) flaw, identified as CVE-2026-39337. This vulnerability affects versions prior to 7.1.0. Unauthenticated attackers can exploit the setup wizard during the initial installation process to inject arbitrary PHP code, leading to complete server compromise. The root cause lies in the insufficient sanitization of the &ldquo;$dbPassword&rdquo; variable. This vulnerability is a result of an incomplete fix for a previous vulnerability, CVE-2025-62521. Organizations using vulnerable versions of ChurchCRM are at risk of unauthorized access, data breaches, and complete system takeover. Upgrading to version 7.1.0 or later is strongly advised to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a malicious HTTP request to the ChurchCRM setup wizard.</li>
<li>The malicious request injects arbitrary PHP code into the <code>$dbPassword</code> variable during the setup process.</li>
<li>Due to insufficient sanitization, the injected PHP code is written to the ChurchCRM configuration file.</li>
<li>The attacker triggers the execution of the configuration file, executing the injected PHP code.</li>
<li>The attacker gains arbitrary code execution on the web server.</li>
<li>The attacker escalates privileges to gain full control of the server.</li>
<li>The attacker installs a persistent backdoor for continued access.</li>
<li>The attacker may then exfiltrate sensitive data or deploy ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39337 allows an unauthenticated attacker to achieve complete server compromise. This could result in the theft of sensitive church member data, modification or destruction of data, defacement of the ChurchCRM website, or use of the server as a platform for launching further attacks. Given the critical nature of the vulnerability and the ease of exploitation, organizations are at high risk. The number of potential victims is high considering the wide usage of this CRM.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade ChurchCRM to version 7.1.0 or later to patch CVE-2026-39337.</li>
<li>Monitor web server logs for suspicious activity related to the ChurchCRM setup wizard. Deploy a Sigma rule to detect suspicious POST requests to the install endpoint.</li>
<li>Implement strong input validation and sanitization for all user-supplied data, especially during the installation process.</li>
<li>Review and harden the web server configuration to prevent unauthorized code execution.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>cve-2026-39337</category><category>churchcrm</category></item></channel></rss>