Cyber Posture

CVE-2026-39337

Critical

Published: 07 April 2026

Published
07 April 2026
Modified
10 April 2026
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0026 48.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

ChurchCRM is an open-source church management system. Prior to 7.1.0, critical pre-authentication remote code execution vulnerability in ChurchCRM's setup wizard allows unauthenticated attackers to inject arbitrary PHP code during the initial installation process, leading to complete server compromise. The "$dbPassword"…

more

variable is not sanitized. This vulnerability exists due to an incomplete fix for CVE-2025-62521. This vulnerability is fixed in 7.1.0.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation and sanitization of inputs like the unsanitized $dbPassword variable to prevent arbitrary PHP code injection in the setup wizard.

prevent

Mandates timely identification, reporting, and remediation of flaws such as this incomplete fix for CVE-2025-62521 via upgrade to version 7.1.0.

prevent

Enforces monitoring and control of communications at system boundaries to block unauthorized remote access to the vulnerable pre-authentication setup wizard endpoint.

Security SummaryAI

CVE-2026-39337 is a critical pre-authentication remote code execution (RCE) vulnerability (CVSS 10.0; CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) affecting ChurchCRM, an open-source church management system, in versions prior to 7.1.0. The flaw resides in the setup wizard during the initial installation process, where the "$dbPassword" variable is not properly sanitized, enabling attackers to inject arbitrary PHP code. This issue stems from an incomplete fix for the prior CVE-2025-62521 and is classified under CWE-94 (Code Injection).

Unauthenticated remote attackers can exploit this vulnerability by targeting the setup wizard endpoint before any authentication is configured. Successful exploitation grants full server compromise, including arbitrary code execution with the privileges of the web server process, potentially leading to data exfiltration, persistence, or further lateral movement within the environment.

The official GitHub Security Advisory (GHSA-pm2v-ggh4-mp7p) confirms the vulnerability is fully remediated in ChurchCRM version 7.1.0, urging users to upgrade immediately. Practitioners should verify installations are not in a vulnerable setup state and implement network controls to block unauthorized access to setup endpoints.

Details

CWE(s)

Affected Products

churchcrm
churchcrm
≤ 7.1.0

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a pre-authentication RCE in a public-facing web application (ChurchCRM setup wizard), directly enabling exploitation of public-facing applications for initial access and server compromise.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References