CVE-2026-42289
ChurchCRM: Cross-Site Request Forgery (CSRF) Leading to Admin Privilege Escalation
CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th
ChurchCRM is an open-source church management system. Prior to 7.3.2, UserEditor.php processes user account creation and permission updates entirely through $_POST parameters with no CSRF token validation. An unauthenticated attacker can craft a malicious HTML page that, when visited by an authenticated administrator, silently elevates any low-privilege user to full administrator or creates a new admin backdoor account without the victim's knowledge This vulnerability is fixed in 7.3.2.
| CWE | CWE-269 CWE-306 CWE-352 |
| Vendor | churchcrm |
| Product | crm |
| Published | May 12, 2026 |
Stay Ahead of the Next One
Get instant alerts for churchcrm crm
Be the first to know when new high vulnerabilities affecting churchcrm crm are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
ChurchCRM / CRM
< 7.3.2