Home

Description

ChurchCRM is an open-source church management system. Prior to 7.3.2, UserEditor.php processes user account creation and permission updates entirely through $_POST parameters with no CSRF token validation. An unauthenticated attacker can craft a malicious HTML page that, when visited by an authenticated administrator, silently elevates any low-privilege user to full administrator or creates a new admin backdoor account without the victim's knowledge This vulnerability is fixed in 7.3.2.

PUBLISHED Reserved 2026-04-26 | Published 2026-05-12 | Updated 2026-05-14 | Assigner GitHub_M




HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-269: Improper Privilege Management

CWE-306: Missing Authentication for Critical Function

CWE-352: Cross-Site Request Forgery (CSRF)

Product status

< 7.3.2
affected

References

github.com/...RM/CRM/security/advisories/GHSA-3xq9-c86x-cwpp exploit

github.com/...RM/CRM/security/advisories/GHSA-3xq9-c86x-cwpp

cve.org (CVE-2026-42289)

nvd.nist.gov (CVE-2026-42289)

Download JSON