CVE-2026-39318

ChurchCRM is an open-source church management system. Versions prior to 7.1.0 have an SQL injection vulnerability in the endpoints `/GroupPropsFormRowOps.php`, `/PersonCustomFieldsRowOps.php`, and `/FamilyCustomFieldsRowOps.php`. A user has to be authenticated. For `ManageGroups` privileges have to be enabled and for the other two endpoints the attack has to be executed by an administrative user. These users can inject arbitrary SQL statements through the `Field` parameter and thus modify tables from the database. This vulnerability is fixed in 7.1.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*

History

15 Apr 2026, 20:20

Type Values Removed Values Added
First Time Churchcrm churchcrm
Churchcrm
CPE cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*
References () https://github.com/ChurchCRM/CRM/security/advisories/GHSA-8r53-w4r6-w62c - () https://github.com/ChurchCRM/CRM/security/advisories/GHSA-8r53-w4r6-w62c - Not Applicable
References () https://github.com/ChurchCRM/CRM/security/advisories/GHSA-j3vj-59vv-h4rc - () https://github.com/ChurchCRM/CRM/security/advisories/GHSA-j3vj-59vv-h4rc - Exploit, Vendor Advisory

09 Apr 2026, 18:17

Type Values Removed Values Added
Summary (en) ChurchCRM is an open-source church management system. Prior to 7.1.0, the GroupPropsFormRowOps.php file contains a SQL injection vulnerability. User input in the Field parameter is directly inserted into SQL queries without proper sanitization. The mysqli_real_escape_string() function does not escape backtick characters, allowing attackers to break out of SQL identifier context and execute arbitrary SQL statements. This vulnerability is fixed in 7.1.0. (en) ChurchCRM is an open-source church management system. Versions prior to 7.1.0 have an SQL injection vulnerability in the endpoints `/GroupPropsFormRowOps.php`, `/PersonCustomFieldsRowOps.php`, and `/FamilyCustomFieldsRowOps.php`. A user has to be authenticated. For `ManageGroups` privileges have to be enabled and for the other two endpoints the attack has to be executed by an administrative user. These users can inject arbitrary SQL statements through the `Field` parameter and thus modify tables from the database. This vulnerability is fixed in 7.1.0.
References
  • () https://github.com/ChurchCRM/CRM/security/advisories/GHSA-8r53-w4r6-w62c -

08 Apr 2026, 19:25

Type Values Removed Values Added
References () https://github.com/ChurchCRM/CRM/security/advisories/GHSA-j3vj-59vv-h4rc - () https://github.com/ChurchCRM/CRM/security/advisories/GHSA-j3vj-59vv-h4rc -

07 Apr 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-07 18:16

Updated : 2026-04-15 20:20


NVD link : CVE-2026-39318

Mitre link : CVE-2026-39318

CVE.ORG link : CVE-2026-39318


JSON object : View

Products Affected

churchcrm

  • churchcrm
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')