


Perceptive Security
SOC/SIEM Consultancy

ChurchCRM is an open-source church management system. Prior to 6.5.3, a path traversal vulnerability in ChurchCRM's backup restore functionality allows authenti…
Published:
6 april 2026 om 22:00:00
Alert date:
7 april 2026 om 19:08:14
Source:
nvd.nist.gov
Web Technologies, Enterprise Applications
ChurchCRM, an open-source church management system, contains a path traversal vulnerability in versions prior to 6.5.3. The vulnerability exists in the backup restore functionality where authenticated administrators can exploit the $rawUploadedFile['name'] parameter in src/ChurchCRM/Backup/RestoreJob.php. This allows uploading arbitrary files with unrestricted names to /var/www/html/tmp_attach/ChurchCRMBackups/. Attackers can achieve remote code execution by overwriting Apache .htaccess configuration files. The vulnerability has been patched in version 6.5.3.
Technical details
Mitigation steps:
Affected products:
ChurchCRM
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-35573
https://github.com/ChurchCRM/CRM/security/advisories/GHSA-r6cr-mvr9-f6wx
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
