Description
ChurchCRM is an open-source church management system. Versions prior to 7.0.2 allow an admin user to edit JSON type system settings to store a JavaScript payload that can execute when any admin views the system settings. The JSON input is left unescaped/unsanitized in SystemSettings.php, leading to XSS. This issue has been fixed in version 7.0.2.
Published: 2026-03-20
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch Now
AI Analysis

Impact

The vulnerability exists in ChurchCRM’s SystemSettings.php, where JSON input for system settings is accepted without necessary escaping or sanitization. An administrator can embed a malicious JavaScript payload into the JSON, which will be rendered unfiltered when another administrator views the settings. This leads to stored cross‑site scripting, permitting an attacker with administrative access to execute arbitrary client‑side code in other admins’ browsers, potentially stealing session cookies, logging keystrokes, or defacing the application.

Affected Systems

All ChurchCRM installations running a version earlier than 7.0.2 are affected. The vulnerability was identified in the open‑source church management system under the vendor product ChurchCRM:CRM. The issue was resolved in the 7.0.2 release, so any deployment on 7.0.2 or later is not vulnerable.

Risk and Exploitability

The CVSS base score is 6.4, indicating a moderate severity. The EPSS probability is below 1%, making widespread exploitation unlikely. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an account with administrative privileges; once satisfied, the attacker can inject malicious scripts that will execute in the browsers of other administrators who view the affected settings. While remote exploitation from an unauthenticated user is not possible, an insider or compromised admin account could pose significant risk to the integrity and confidentiality of the system.

Generated by OpenCVE AI on March 23, 2026 at 16:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade ChurchCRM to version 7.0.2 or later to apply the fix that properly sanitizes the JSON input.
  • If an upgrade is not immediately feasible, restrict access to the system settings page to a minimal set of trusted administrators and monitor for unusual script activity.
  • Verify that the JSON handling code has been patched and that no legacy scripts remain.

Generated by OpenCVE AI on March 23, 2026 at 16:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*

Fri, 20 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Churchcrm
Churchcrm churchcrm
Vendors & Products Churchcrm
Churchcrm churchcrm

Fri, 20 Mar 2026 01:30:00 +0000

Type Values Removed Values Added
Description ChurchCRM is an open-source church management system. Versions prior to 7.0.2 allow an admin user to edit JSON type system settings to store a JavaScript payload that can execute when any admin views the system settings. The JSON input is left unescaped/unsanitized in SystemSettings.php, leading to XSS. This issue has been fixed in version 7.0.2.
Title ChurchCRM is vulnerable to Stored XSS through JSON handling in SystemSettings.php
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L'}


Subscriptions

Churchcrm Churchcrm
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-20T14:41:30.274Z

Reserved: 2026-03-16T21:03:44.420Z

Link: CVE-2026-32880

cve-icon Vulnrichment

Updated: 2026-03-20T14:41:06.418Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T02:16:36.067

Modified: 2026-03-23T15:29:56.827

Link: CVE-2026-32880

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:10:11Z

Weaknesses