Impact
The vulnerability allows an attacker to bypass two‑factor authentication and account lockout in ChurchCRM versions 7.2.x, enabling them to log in as any user without proper credentials; this can lead to unauthorized data access and potential full system compromise.
Affected Systems
ChurchCRM Community Edition versions 7.2.0 through 7.2.2 are affected; all newer releases such as 7.3.1 and onward contain the fix.
Risk and Exploitability
With a CVSS score of 9.6 the flaw is considered critical; exploitation does not require elevated privileges and can be performed via the public API login endpoint over the network, making it a high‑risk attack vector. The EPSS score is not available and the vulnerability has not been listed in the CISA KEV catalog, but the severity indicates that attackers can readily target exposed installations.
OpenCVE Enrichment