Home

Description

ChurchCRM is an open-source church management system. Prior to 6.5.3, a path traversal vulnerability in ChurchCRM's backup restore functionality allows authenticated administrators to upload arbitrary files and achieve remote code execution by overwriting Apache .htaccess configuration files. The vulnerability exists in src/ChurchCRM/Backup/RestoreJob.php. The $rawUploadedFile['name'] parameter is user-controlled and allows uploading files with arbitrary names to /var/www/html/tmp_attach/ChurchCRMBackups/. This vulnerability is fixed in 6.5.3.

PUBLISHED Reserved 2026-04-03 | Published 2026-04-07 | Updated 2026-04-08 | Assigner GitHub_M




CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-434: Unrestricted Upload of File with Dangerous Type

Product status

< 6.5.3
affected

References

github.com/...RM/CRM/security/advisories/GHSA-r6cr-mvr9-f6wx exploit

github.com/...RM/CRM/security/advisories/GHSA-r6cr-mvr9-f6wx

cve.org (CVE-2026-35573)

nvd.nist.gov (CVE-2026-35573)

Download JSON