CVE-2026-40484 PUBLISHED

ChurchCRM: Authenticated Remote Code Execution via Unrestricted PHP File Write in Database Restore Function

Assigner: GitHub_M
Reserved: 13.04.2026 Published: 17.04.2026 Updated: 17.04.2026

ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the database backup restore functionality extracts uploaded archive contents and copies files from the Images/ directory into the web-accessible document root using recursiveCopyDirectory(), which performs no file extension filtering. An authenticated administrator can upload a crafted backup archive containing a PHP webshell inside the Images/ directory, which is then written to a publicly accessible path and executable via HTTP requests, resulting in remote code execution as the web server user. The restore endpoint also lacks CSRF token validation, enabling exploitation through cross-site request forgery targeting an authenticated administrator. This issue has been fixed in version 7.2.0.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVSS Score: 9.1

Product Status

Vendor ChurchCRM
Product CRM
Versions
  • Version < 7.2.0 is affected

References

Problem Types

  • CWE-269: Improper Privilege Management CWE
  • CWE-434: Unrestricted Upload of File with Dangerous Type CWE
  • CWE-552: Files or Directories Accessible to External Parties CWE