CVE-2026-40484

ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the database backup restore functionality extracts uploaded archive contents and copies files from the Images/ directory into the web-accessible document root using recursiveCopyDirectory(), which performs no file extension filtering. An authenticated administrator can upload a crafted backup archive containing a PHP webshell inside the Images/ directory, which is then written to a publicly accessible path and executable via HTTP requests, resulting in remote code execution as the web server user. The restore endpoint also lacks CSRF token validation, enabling exploitation through cross-site request forgery targeting an authenticated administrator. This issue has been fixed in version 7.2.0.
Configurations

No configuration.

History

18 Apr 2026, 00:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-18 00:16

Updated : 2026-04-20 18:59


NVD link : CVE-2026-40484

Mitre link : CVE-2026-40484

CVE.ORG link : CVE-2026-40484


JSON object : View

Products Affected

No product.

CWE
CWE-269

Improper Privilege Management

CWE-434

Unrestricted Upload of File with Dangerous Type

CWE-552

Files or Directories Accessible to External Parties