top of page
perceptive_background_267k.jpg

ChurchCRM is an open-source church management system. Prior to 6.5.3, a path traversal vulnerability in ChurchCRM's backup restore functionality allows authenti…

Published:

6 april 2026 om 22:00:00

Alert date:

7 april 2026 om 19:08:14

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Enterprise Applications

ChurchCRM, an open-source church management system, contains a path traversal vulnerability in versions prior to 6.5.3. The vulnerability exists in the backup restore functionality where authenticated administrators can exploit the $rawUploadedFile['name'] parameter in src/ChurchCRM/Backup/RestoreJob.php. This allows uploading arbitrary files with unrestricted names to /var/www/html/tmp_attach/ChurchCRMBackups/. Attackers can achieve remote code execution by overwriting Apache .htaccess configuration files. The vulnerability has been patched in version 6.5.3.

Technical details

Mitigation steps:

Affected products:

ChurchCRM

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page