Cyber Posture

CVE-2026-42289

High

Published: 12 May 2026

Published
12 May 2026
Modified
12 May 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score N/A
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-42289 is a high-severity Improper Privilege Management (CWE-269) vulnerability. Its CVSS base score is 8.8 (High).

Operationally, it is not currently listed in the CISA KEV catalog.

This vulnerability is AI-related — categorised as Machine Learning Libraries.

Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-306 CWE-269

Guarantees critical functions are protected by mandatory invocation of the access control mechanism.

addresses: CWE-306 CWE-269

Certification assesses that critical functions have required authentication controls in place.

addresses: CWE-306 CWE-352

Re-authentication enforces fresh credential validation for critical functions or operations as defined by the organization parameter.

addresses: CWE-269 CWE-306

Baseline tailoring enforces organization-specific privilege-management decisions rather than accepting generic high-water-mark settings.

addresses: CWE-269 CWE-306

Documented procedures for role definition, privilege assignment, and removal provide the management framework that prevents improper privilege management.

addresses: CWE-269 CWE-306

By determining which components are critical, the analysis drives proper privilege assignment and management for those components, limiting attacker escalation paths.

addresses: CWE-269 CWE-306

Developer training on implemented privilege management controls prevents improper assignment or escalation through correct configuration and operation.

addresses: CWE-269 CWE-306

Least-privilege and separation-of-duties principles prevent improper privilege management.

NVD Description

ChurchCRM is an open-source church management system. Prior to 7.3.2, UserEditor.php processes user account creation and permission updates entirely through $_POST parameters with no CSRF token validation. An unauthenticated attacker can craft a malicious HTML page that, when visited by…

more

an authenticated administrator, silently elevates any low-privilege user to full administrator or creates a new admin backdoor account without the victim's knowledge This vulnerability is fixed in 7.3.2.

Deeper analysisAI

Automated synthesis unavailable for this CVE.

Details

CWE(s)

AI Security AnalysisAI

AI Category
Machine Learning Libraries
Risk Domain
N/A
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
Matched keywords: backdoor

References