Impact
ChurchCRM's API middleware contains a critical authentication bypass that allows unauthenticated attackers to access all protected API endpoints by including the string "api/public" anywhere in the request URL. This flaw enables an attacker to retrieve complete member data and system information, exposing personal data and operational details. The vulnerability falls under the weakness type CWE-284: Improper Permission Assignment.
Affected Systems
The affected product is ChurchCRM:CRM. Versions prior to 7.1.0 are vulnerable; the issue was fixed in version 7.1.0. No other versions are listed as affected.
Risk and Exploitability
The CVSS score of 9.1 indicates a high severity vulnerability. EPSS reporting indicates a very low exploitation probability of 0.19%, and the CVE is not present in the CISA KEV catalog. The likely attack vector involves sending crafted HTTP requests to the API endpoints, so exposure is possible to any network user who can reach the API surface. If exploited, confidentiality and integrity of church member data are compromised and system information could be misused.
OpenCVE Enrichment