CVE-2026-35575
Received Received - Intake
Stored XSS in ChurchCRM Admin Panel Enables Admin Account Takeover

Publication date: 2026-04-07

Last updated on: 2026-04-09

Assigner: GitHub, Inc.

Description
ChurchCRM is an open-source church management system. Prior to 6.5.3, a Stored Cross-Site Scripting (Stored XSS) vulnerability in the admin panel’s group-creation feature allows any user with group-creation privileges to inject malicious JavaScript that executes automatically when an administrator views the page. This enables attackers to steal the administrator’s session cookies, potentially leading to full administrative account takeover. This vulnerability is fixed in 6.5.3.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-07
Last Modified
2026-04-09
Generated
2026-05-07
AI Q&A
2026-04-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
churchcrm churchcrm to 6.5.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1004 The product uses a cookie to store sensitive information, but the cookie is not marked with the HttpOnly flag.
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-35575 is a Stored Cross-Site Scripting (Stored XSS) vulnerability in the ChurchCRM application, specifically in the admin panel's group-creation feature. Users with group-creation privileges can inject malicious JavaScript code into the group name field. This malicious script executes automatically when an administrator views the affected page.

Because the administrator's session cookies lack the HttpOnly flag, the injected script can steal these cookies. An attacker can then use the stolen cookies to take over the administrator's account, gaining full administrative control.


How can this vulnerability impact me? :

This vulnerability allows low-privilege users to escalate their privileges to full administrative access by stealing administrator session cookies. This can lead to unauthorized access to sensitive administrative information and the ability to modify or delete data.

  • Compromise of confidentiality: attackers can access all administrative data.
  • Compromise of integrity: attackers can modify all data within the system.
  • Compromise of availability: attackers can disrupt user accounts and services, for example by changing other users' passwords.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking for malicious JavaScript code injected into the group names within the admin panel of ChurchCRM versions up to 6.5.2. Specifically, look for suspicious scripts in the group-creation feature that execute when an administrator views the page.

Since the exploit involves stealing administrator session cookies due to missing HttpOnly flags, monitoring HTTP traffic for unusual requests or outgoing connections to attacker-controlled domains after an admin views group pages can help detect exploitation.

Suggested commands include using web application scanning tools or manual inspection of the group names in the database for embedded JavaScript code. For example, querying the database for group names containing script tags or suspicious payloads.

  • SQL query example to find suspicious group names: SELECT * FROM groups WHERE group_name LIKE '%<script>%';
  • Use network monitoring tools (e.g., tcpdump, Wireshark) to capture HTTP traffic and filter for unusual outbound requests after admin panel access.

What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade ChurchCRM to version 6.5.3 or later, where this Stored XSS vulnerability in the group-creation feature has been fixed.

Until the upgrade can be applied, restrict group-creation privileges to trusted users only, as the vulnerability requires group-creation privileges to exploit.

Additionally, monitor and sanitize any existing group names in the system to remove any malicious scripts.

Consider implementing security best practices such as setting the HttpOnly flag on session cookies to prevent JavaScript access.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows attackers to steal administrator session cookies and gain full administrative control, compromising confidentiality, integrity, and availability of sensitive data within the ChurchCRM system.

Such a compromise could lead to unauthorized access to personal and sensitive information managed by the system, potentially violating data protection regulations like GDPR and HIPAA that require safeguarding personal data against unauthorized access and ensuring system integrity.

Specifically, the ability to escalate privileges and modify or access all administrative data increases the risk of data breaches, which must be reported under these regulations and could result in legal and financial penalties.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart