Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
9.1
ChurchCRM versions before 7.2.0 allow attackers to run malicious code
CVE-2026-40484
Summary
ChurchCRM, a church management system, has a security flaw that allows a malicious user to upload and execute code on the server. This can happen when an administrator restores a database backup. ChurchCRM version 7.2.0 fixes this issue. Update to the latest version to prevent exploitation.
Original title
ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the database backup restore functionality extracts uploaded archive contents and copies files from the Images/ dire...
Original description
ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the database backup restore functionality extracts uploaded archive contents and copies files from the Images/ directory into the web-accessible document root using recursiveCopyDirectory(), which performs no file extension filtering. An authenticated administrator can upload a crafted backup archive containing a PHP webshell inside the Images/ directory, which is then written to a publicly accessible path and executable via HTTP requests, resulting in remote code execution as the web server user. The restore endpoint also lacks CSRF token validation, enabling exploitation through cross-site request forgery targeting an authenticated administrator. This issue has been fixed in version 7.2.0.
nvd CVSS3.1
9.1
Vulnerability type
CWE-269
Improper Privilege Management
CWE-434
Unrestricted File Upload
CWE-552
Published: 18 Apr 2026 · Updated: 18 Apr 2026 · First seen: 18 Apr 2026