Description
ChurchCRM is an open-source church management system. Prior to 7.3.2, top-level cross-site GET navigation from an attacker-controlled page to FundRaiserDelete.php, PropertyTypeDelete.php, or NoteDelete.php causes a logged-in ChurchCRM user with the relevant role to silently delete records, including cascaded property and record-to-property assignments. This vulnerability is fixed in 7.3.2.
Published: 2026-05-12
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability enables a malicious attacker to trigger a silent deletion of church records when a logged‑in user navigates to certain legacy GET URLs. Because the application performs the delete operation on a simple GET request, a user who is authenticated and possesses the appropriate role can have their affected entities removed without confirmation or a CSRF token. The loss includes primary records, associated properties, and cascading property‑to‑record links, resulting in permanent data loss. The weakness is a classic CSRF flaw, categorised as CWE‑352, and additional failure to guard against hard‑coded or default behaviours per CWE‑650.

Affected Systems

The issue exists in the open‑source ChurchCRM management system, affecting any deployment that is running a version prior to 7.3.2. The affected code is within the legacy delete pages FundRaiserDelete.php, PropertyTypeDelete.php, and NoteDelete.php. No specific version numbers are provided beyond the knowledge that the fix is available in 7.3.2; any earlier releases are considered vulnerable.

Risk and Exploitability

This flaw carries a CVSS score of 8.1, indicating a high severity. The EPSS metric is not provided, so the likelihood of a current exploit remains unclear, but the weakness is a common CSRF use case that pairs well with social engineering or compromised user credentials. It is not listed in the CISA KEV catalog, suggesting no confirmed active exploitation. An attacker requires that a target user be authenticated and possess delete privileges; they can then craft a link or embed the URL in a malicious page to force the deletion as the victim proceeds to visit it. The vulnerability does not require privileged code execution or administrative access on the server, making it more attractive to low‑skill adversaries who can readily exploit it with minimal effort.

Generated by OpenCVE AI on May 12, 2026 at 23:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade ChurchCRM to version 7.3.2 or later to apply the vendor patch that removes the GET delete functionality and adds CSRF protection.
  • Immediately invalidate all user sessions (e.g., log out all users or reset session tokens) to prevent any authenticated accounts from executing remaining silent deletions.
  • If an upgrade cannot be performed immediately, block access to the legacy delete pages or redirect them to a secure POST endpoint that requires a CSRF token.

Generated by OpenCVE AI on May 12, 2026 at 23:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 13 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 13 May 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Churchcrm
Churchcrm churchcrm
Vendors & Products Churchcrm
Churchcrm churchcrm

Tue, 12 May 2026 22:45:00 +0000

Type Values Removed Values Added
Description ChurchCRM is an open-source church management system. Prior to 7.3.2, top-level cross-site GET navigation from an attacker-controlled page to FundRaiserDelete.php, PropertyTypeDelete.php, or NoteDelete.php causes a logged-in ChurchCRM user with the relevant role to silently delete records, including cascaded property and record-to-property assignments. This vulnerability is fixed in 7.3.2.
Title ChurchCRM: CSRF via legacy GET-delete pages (FundRaiserDelete.php, PropertyTypeDelete.php, NoteDelete.php)
Weaknesses CWE-352
CWE-650
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H'}


Subscriptions

Churchcrm Churchcrm
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-13T15:05:29.129Z

Reserved: 2026-05-06T20:59:00.594Z

Link: CVE-2026-44548

cve-icon Vulnrichment

Updated: 2026-05-13T15:04:22.753Z

cve-icon NVD

Status : Deferred

Published: 2026-05-12T23:16:18.750

Modified: 2026-05-13T16:16:58.690

Link: CVE-2026-44548

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-13T09:45:09Z

Weaknesses