CVE-2026-40593 PUBLISHED

ChurchCRM: Stored XSS in UserEditor.php via Login Name Field

Assigner: GitHub_M
Reserved: 14.04.2026 Published: 18.04.2026 Updated: 18.04.2026

ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the User Editor (UserEditor.php) renders stored usernames directly into an HTML input value attribute without applying htmlspecialchars(). An administrator can save a username containing HTML attribute-breaking characters and event handlers, which execute in the browser of any administrator who subsequently views that user's editor page, resulting in stored XSS. This issue has been fixed in version 7.2.0.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
CVSS Score: 4.8

Product Status

Vendor ChurchCRM
Product CRM
Versions
  • Version < 7.2.0 is affected

References

Problem Types

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE
  • CWE-116: Improper Encoding or Escaping of Output CWE