top of page
perceptive_background_267k.jpg

ChurchCRM is an open-source church management system. Prior to 7.1.0, an authenticated API user can modify any family record's state without proper authorizatio…

Published:

6 april 2026 om 22:00:00

Alert date:

7 april 2026 om 19:08:14

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Identity & Access

ChurchCRM, an open-source church management system, contains an authorization bypass vulnerability prior to version 7.1.0. Authenticated API users can modify any family record's state without proper authorization by changing the familyId parameter in requests. The vulnerability affects multiple endpoints including family verification, activation, and geocoding functions. Users can deactivate/reactivate arbitrary families, spam verification emails, and mark families as verified without having the required EditRecords privilege. This represents a broken access control issue that allows privilege escalation within the application. The vulnerability has been fixed in version 7.1.0.

Technical details

Mitigation steps:

Affected products:

ChurchCRM

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page