Home

Description

ChurchCRM is an open-source church management system. Prior to 7.1.0, a stored cross-site scripting vulnerability exists in ChurchCRM's person profile editing functionality. Non-administrative users who have the EditSelf permission can inject malicious JavaScript into their Facebook, LinkedIn, and X profile fields. Due to a 50-character field limit, the payload is distributed across all three fields and chains their onfocus event handlers to execute in sequence. When any user, including administrators, views the attacker's profile, their session cookies are exfiltrated to a remote server. This vulnerability is fixed in 7.1.0.

PUBLISHED Reserved 2026-04-06 | Published 2026-04-07 | Updated 2026-04-09 | Assigner GitHub_M




HIGH: 8.9CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 7.1.0
affected

References

github.com/...RM/CRM/security/advisories/GHSA-fcp5-pwvj-v7xm

cve.org (CVE-2026-39328)

nvd.nist.gov (CVE-2026-39328)

Download JSON