Description
ChurchCRM is an open-source church management system. Prior to 6.5.3, a path traversal vulnerability in ChurchCRM's backup restore functionality allows authenticated administrators to upload arbitrary files and achieve remote code execution by overwriting Apache .htaccess configuration files. The vulnerability exists in src/ChurchCRM/Backup/RestoreJob.php. The $rawUploadedFile['name'] parameter is user-controlled and allows uploading files with arbitrary names to /var/www/html/tmp_attach/ChurchCRMBackups/. This vulnerability is fixed in 6.5.3.
Published: 2026-04-07
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via Path Traversal
Action: Immediate Patch
AI Analysis

Impact

A flaw in ChurchCRM’s backup restore feature allows an authenticated administrator to upload files with arbitrary names. The uploaded file is written to the temporary directory /var/www/html/tmp_attach/ChurchCRMBackups/. By choosing a malicious filename such as a crafted .htaccess file, the attacker can alter Apache configuration and execute arbitrary code, completely compromising the host. The weakness is a classic path traversal (CWE‑22) combined with unsafe file upload (CWE‑434).

Affected Systems

ChurchCRM installations running any version prior to 6.5.3 are affected. The vulnerability resides in src/ChurchCRM/Backup/RestoreJob.php and is present regardless of whether the system is running on Linux, Windows, or other operating systems, although the specific server environment is not detailed in the advisory.

Risk and Exploitability

The CVSS score of 9.1 indicates a severe threat. The EPSS score is below 1%, suggesting that, so far, exploitation attempts have been rare, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires authenticated administrator access; an attacker who obtains or compromises such credentials can upload the malicious file and trigger execution through the altered .htaccess. The impact includes loss of confidentiality, integrity, and availability, potentially leading to full system takeover. Operating‑system‑specific details are not provided, so any potential mitigations based on OS cannot be evaluated from the available data.

Generated by OpenCVE AI on April 10, 2026 at 23:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official ChurchCRM update to version 6.5.3 or later.
  • Restrict the backup restore feature to trusted administrators only, or disable it if not needed.
  • Ensure the temporary directory (/var/www/html/tmp_attach/ChurchCRMBackups/) has permissions that prevent public web access.
  • Monitor the temporary directory for unexpected or suspicious file uploads and contains alerts for policy violations.

Generated by OpenCVE AI on April 10, 2026 at 23:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*

Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Churchcrm
Churchcrm churchcrm
Vendors & Products Churchcrm
Churchcrm churchcrm

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Description ChurchCRM is an open-source church management system. Prior to 6.5.3, a path traversal vulnerability in ChurchCRM's backup restore functionality allows authenticated administrators to upload arbitrary files and achieve remote code execution by overwriting Apache .htaccess configuration files. The vulnerability exists in src/ChurchCRM/Backup/RestoreJob.php. The $rawUploadedFile['name'] parameter is user-controlled and allows uploading files with arbitrary names to /var/www/html/tmp_attach/ChurchCRMBackups/. This vulnerability is fixed in 6.5.3.
Title ChurchCRM has a Path traversal leads to RCE
Weaknesses CWE-22
CWE-434
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Churchcrm Churchcrm
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-08T18:49:46.996Z

Reserved: 2026-04-03T20:09:02.827Z

Link: CVE-2026-35573

cve-icon Vulnrichment

Updated: 2026-04-08T18:49:36.855Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-07T18:16:41.760

Modified: 2026-04-10T20:59:20.150

Link: CVE-2026-35573

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T14:26:43Z

Weaknesses