Description
ChurchCRM is an open-source church management system. Prior to 7.0.0, it was possible in many places across the ChurchCRM application to create a link that, when visited by an authenticated user, would redirect them to any URL chosen by an attacker if they clicked 'Cancel' button on the page. For this write-up the DonatedItemEditor.php will be used as an example, however wherever all instances of 'linkBack' should be assessed. This vulnerability is fixed in 7.0.0.
Published: 2026-04-13
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Open Redirect
Action: Apply Patch
AI Analysis

Impact

ChurchCRM, an open‑source church management application, contains an open redirect flaw in multiple pages, including DonatedItemEditor.php. An authenticated user can be redirected to an attacker‑chosen URL when they click a Cancel button that passes the linkBack parameter. This flaw allows malicious actors to deliver phishing pages or other malicious content to trusted users via a straightforward web‑based interaction. The weakness is a classic open redirect (CWE‑601).

Affected Systems

All ChurchCRM installations prior to version 7.0.0 are affected, as the flaw exists wherever the linkBack parameter is used. The affected product is the ChurchCRM CRM application, and any instance that has not been updated to 7.0.0 or later remains vulnerable.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate risk. An attacker only needs to be authenticated within the application to exploit the redirect; no local enumeration or privilege escalation is required. EPSS data is not available, and the vulnerability is not currently listed in the CISA KEV catalog. Based on the description, the likely attack vector involves a web‑based user clicking a crafted link that manipulates the linkBack parameter.

Generated by OpenCVE AI on April 13, 2026 at 18:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade ChurchCRM to version 7.0.0 or later to remove the open redirect flaw.
  • If an immediate upgrade is not feasible, disable or sanitize the linkBack parameter in all pages that use it to prevent arbitrary redirects.
  • Verify that no user interface elements still reference the linkBack parameter after changes are applied.
  • Monitor application logs for unexpected redirect activity and alert administrators of suspicious patterns.
  • Educate users about the risk of clicking unfamiliar links and advise them to verify destination URLs before proceeding.

Generated by OpenCVE AI on April 13, 2026 at 18:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Churchcrm
Churchcrm churchcrm
Vendors & Products Churchcrm
Churchcrm churchcrm

Mon, 13 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Description ChurchCRM is an open-source church management system. Prior to 7.0.0, it was possible in many places across the ChurchCRM application to create a link that, when visited by an authenticated user, would redirect them to any URL chosen by an attacker if they clicked 'Cancel' button on the page. For this write-up the DonatedItemEditor.php will be used as an example, however wherever all instances of 'linkBack' should be assessed. This vulnerability is fixed in 7.0.0.
Title ChurchCRM has an Open Redirect via the ‘linkBack’ URL Parameter in DonatedItemEditor.php
Weaknesses CWE-601
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Churchcrm Churchcrm
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-16T13:26:41.668Z

Reserved: 2026-04-07T22:40:33.820Z

Link: CVE-2026-39940

cve-icon Vulnrichment

Updated: 2026-04-16T13:26:32.207Z

cve-icon NVD

Status : Deferred

Published: 2026-04-13T17:16:30.450

Modified: 2026-04-17T15:33:34.050

Link: CVE-2026-39940

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:33:56Z

Weaknesses