PT-2026-33532 · Churchcrm · Crm

Published

2026-04-17

·

Updated

2026-04-18

·

CVE-2026-40484

CVSS v3.1

9.1

Critical

AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the database backup restore functionality extracts uploaded archive contents and copies files from the Images/ directory into the web-accessible document root using recursiveCopyDirectory(), which performs no file extension filtering. An authenticated administrator can upload a crafted backup archive containing a PHP webshell inside the Images/ directory, which is then written to a publicly accessible path and executable via HTTP requests, resulting in remote code execution as the web server user. The restore endpoint also lacks CSRF token validation, enabling exploitation through cross-site request forgery targeting an authenticated administrator. This issue has been fixed in version 7.2.0.

Fix

Unrestricted File Upload

Files Accessible to External Parties

Improper Privilege Management

Weakness Enumeration

Related Identifiers

CVE-2026-40484

Affected Products

Crm