๐Ÿ” CVE Alert

CVE-2026-40582

UNKNOWN 0.0

ChurchCRM: Authentication Bypass in `/api/public/user/login` Allows Bypass of 2FA and Account Lockout

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the /api/public/user/login endpoint validates only the username and password before returning the user's API key, bypassing the normal authentication flow that enforces account lockout and two-factor authentication checks. An attacker with knowledge of a user's password can obtain API access even when the account is locked or has 2FA enabled, granting direct access to all protected API endpoints with that user's privileges. This issue has been fixed in version 7.2.0. Note: this issue had a duplicate, GHSA-472m-p3gf-46xp, which has been closed.

CWE CWE-288 CWE-305
Vendor churchcrm
Product crm
Published Apr 17, 2026
Stay Ahead of the Next One

Get instant alerts for churchcrm crm

Be the first to know when new unknown vulnerabilities affecting churchcrm crm are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

ChurchCRM / CRM
< 7.2.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/ChurchCRM/CRM/security/advisories/GHSA-8cwr-x83m-mh9x github.com: https://github.com/ChurchCRM/CRM/pull/8607 github.com: https://github.com/ChurchCRM/CRM/commit/214694eb83778e1f5e52b3dfa2a99d0e965c1850