CVE-2026-39337
Published: 07 April 2026
Description
ChurchCRM is an open-source church management system. Prior to 7.1.0, critical pre-authentication remote code execution vulnerability in ChurchCRM's setup wizard allows unauthenticated attackers to inject arbitrary PHP code during the initial installation process, leading to complete server compromise. The "$dbPassword"…
more
variable is not sanitized. This vulnerability exists due to an incomplete fix for CVE-2025-62521. This vulnerability is fixed in 7.1.0.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation and sanitization of inputs like the unsanitized $dbPassword variable to prevent arbitrary PHP code injection in the setup wizard.
Mandates timely identification, reporting, and remediation of flaws such as this incomplete fix for CVE-2025-62521 via upgrade to version 7.1.0.
Enforces monitoring and control of communications at system boundaries to block unauthorized remote access to the vulnerable pre-authentication setup wizard endpoint.
Security SummaryAI
CVE-2026-39337 is a critical pre-authentication remote code execution (RCE) vulnerability (CVSS 10.0; CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) affecting ChurchCRM, an open-source church management system, in versions prior to 7.1.0. The flaw resides in the setup wizard during the initial installation process, where the "$dbPassword" variable is not properly sanitized, enabling attackers to inject arbitrary PHP code. This issue stems from an incomplete fix for the prior CVE-2025-62521 and is classified under CWE-94 (Code Injection).
Unauthenticated remote attackers can exploit this vulnerability by targeting the setup wizard endpoint before any authentication is configured. Successful exploitation grants full server compromise, including arbitrary code execution with the privileges of the web server process, potentially leading to data exfiltration, persistence, or further lateral movement within the environment.
The official GitHub Security Advisory (GHSA-pm2v-ggh4-mp7p) confirms the vulnerability is fully remediated in ChurchCRM version 7.1.0, urging users to upgrade immediately. Practitioners should verify installations are not in a vulnerable setup state and implement network controls to block unauthorized access to setup endpoints.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a pre-authentication RCE in a public-facing web application (ChurchCRM setup wizard), directly enabling exploitation of public-facing applications for initial access and server compromise.