Description
ChurchCRM is an open-source church management system. Prior to 7.1.0, a stored cross-site scripting vulnerability exists in ChurchCRM's person profile editing functionality. Non-administrative users who have the EditSelf permission can inject malicious JavaScript into their Facebook, LinkedIn, and X profile fields. Due to a 50-character field limit, the payload is distributed across all three fields and chains their onfocus event handlers to execute in sequence. When any user, including administrators, views the attacker's profile, their session cookies are exfiltrated to a remote server. This vulnerability is fixed in 7.1.0.
CVSS Metrics
- Vector
- CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L
- Attack Vector
- network
- Complexity
- low
- Privileges
- low
- User Action
- required
- Scope
- changed
- Confidentiality
- high
- Integrity
- high
- Availability
- low
- Weaknesses
- CWE-79
Metadata
- Primary Vendor
- CHURCHCRM
- Published
- 4/7/2026
- Last Modified
- 4/10/2026
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
churchcrm : churchcrm
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.