Impact
The vulnerability is a stored Cross‑Site Scripting flaw in the Create Events module of ChurchCRM. Low‑privilege users can inject malicious JavaScript into the Description field of an event. The script is persisted in the database and executed whenever the event is viewed, including by administrators, leading to session hijacking and potential full account takeover. The flaw represents a classic CWE‑79 weakness where input is not properly sanitized before reflection.
Affected Systems
The product affected is ChurchCRM, an open‑source church management system. All releases prior to version 6.7.2 contain the flaw; version 6.7.2 and later include the fix. The vulnerability is present in the Create Events feature within Church Calendar, affecting all users who can view these events.
Risk and Exploitability
The CVSS base score of 7.2 indicates a high likelihood of significant impact if exploited. The EPSS score is below 1 %, suggesting that the probability of real‑world exploitation is currently low. The flaw is not listed in the CISA Known Exploited Vulnerabilities catalog. The exploitation scenario requires an attacker with low privileges to create an event containing the XSS payload; when any user—including administrators—loads the event page, the injected script runs in the victim’s browser, enabling session theft or other malicious actions. This is therefore an internal or local exploitation vector, but once access is gained it can lead to full compromise of the victim’s account.
OpenCVE Enrichment