Home

Description

ChurchCRM is an open-source church management system. Prior to 7.1.0, a Blind Reflected Cross-Site Scripting vulnerability exists in the search parameter accepted by the ChurchCRM dashboard. The application fails to sanitize or encode user-supplied input prior to rendering it within the browser's DOM. Although the application ultimately returns an HTTP 500 error due to the malformed API request caused by the payload, the browser's JavaScript engine parses and executes the injected <script> tags before the error response is returned — resulting in successful code execution regardless of the server-side error. This vulnerability is fixed in 7.1.0.

PUBLISHED Reserved 2026-04-06 | Published 2026-04-07 | Updated 2026-04-09 | Assigner GitHub_M




HIGH: 8.6CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-1004: Sensitive Cookie Without 'HttpOnly' Flag

Product status

< 7.1.0
affected

References

github.com/...RM/CRM/security/advisories/GHSA-3ghg-qfqw-rcqf

cve.org (CVE-2026-39338)

nvd.nist.gov (CVE-2026-39338)

Download JSON