DNA View

Critical Severity Vulnerability

This vulnerability has been rated as Critical severity. Immediate action is recommended.

CVE-2026-40484

Critical
Low Medium High Critical
9.1
CVSS Score
Published: Apr 18, 2026
Last Modified: Apr 18, 2026

Vulnerability Description

ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the database backup restore functionality extracts uploaded archive contents and copies files from the Images/ directory into the web-accessible document root using recursiveCopyDirectory(), which performs no file extension filtering. An authenticated administrator can upload a crafted backup archive containing a PHP webshell inside the Images/ directory, which is then written to a publicly accessible path and executable via HTTP requests, resulting in remote code execution as the web server user. The restore endpoint also lacks CSRF token validation, enabling exploitation through cross-site request forgery targeting an authenticated administrator. This issue has been fixed in version 7.2.0.

CVSS Metrics

Common Vulnerability Scoring System

Vector String:

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Attack Vector
N
Attack Complexity
L
Privileges Required
H
User Interaction
N
Scope
C
Confidentiality
H
Integrity
H
Availability
H

Severity Details

9.1
out of 10.0
Critical

Weakness Type (CWE)

CWE-269 Top 25 #25

Improper Privilege Management

Description
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Exploit Likelihood
Medium
Typical Severity
High
OWASP Top 10
A01:2021-Broken Access Control
Abstraction Level
Class

Key Information

Published Date
April 18, 2026