


Perceptive Security
SOC/SIEM Consultancy

ChurchCRM is an open-source church management system. Prior to 7.1.0, an authenticated API user can modify any family record's state without proper authorizatio…
Published:
6 april 2026 om 22:00:00
Alert date:
7 april 2026 om 19:08:14
Source:
nvd.nist.gov
Web Technologies, Identity & Access
ChurchCRM, an open-source church management system, contains an authorization bypass vulnerability prior to version 7.1.0. Authenticated API users can modify any family record's state without proper authorization by changing the familyId parameter in requests. The vulnerability affects multiple endpoints including family verification, activation, and geocoding functions. Users can deactivate/reactivate arbitrary families, spam verification emails, and mark families as verified without having the required EditRecords privilege. This represents a broken access control issue that allows privilege escalation within the application. The vulnerability has been fixed in version 7.1.0.
Technical details
Mitigation steps:
Affected products:
ChurchCRM
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-39331
https://github.com/ChurchCRM/CRM/security/advisories/GHSA-vwh8-x823-wjc5
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
