CVE-2026-39333
Received Received - Intake
Reflected XSS in ChurchCRM FindFundRaiser.php Endpoint

Publication date: 2026-04-07

Last updated on: 2026-04-10

Assigner: GitHub, Inc.

Description
ChurchCRM is an open-source church management system. Prior to 7.1.0, he FindFundRaiser.php endpoint reflects user-supplied input (DateStart and DateEnd) into HTML input field attributes without proper output encoding for the HTML attribute context. An authenticated attacker can craft a malicious URL that executes arbitrary JavaScript when visited by another authenticated user. This constitutes a reflected XSS vulnerability. This vulnerability is fixed in 7.1.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-07
Last Modified
2026-04-10
Generated
2026-05-07
AI Q&A
2026-04-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
churchcrm churchcrm to 7.1.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-39333 is a reflected Cross-Site Scripting (XSS) vulnerability in the ChurchCRM software, specifically in the FindFundRaiser.php endpoint before version 7.1.0.

The vulnerability occurs because user-supplied input parameters DateStart and DateEnd are inserted directly into HTML input field attributes without proper encoding or escaping.

An authenticated attacker can craft a malicious URL that injects JavaScript code by breaking out of the HTML attribute context, for example by injecting event handlers like 'onfocus'.

When another authenticated user visits this malicious URL, the injected JavaScript executes in the context of the application, potentially exposing sensitive data such as session cookies and allowing unauthorized actions.


How can this vulnerability impact me? :

This vulnerability can have serious impacts including exposure of sensitive information and unauthorized actions performed on behalf of authenticated users.

  • An attacker can steal session cookies, leading to account compromise.
  • Malicious scripts can execute in the victim's browser, potentially manipulating data or performing actions with the victim's privileges.
  • The attack requires the victim to be authenticated and to visit a crafted malicious URL.
  • The vulnerability has a high severity with a CVSS score of 8.7, indicating significant confidentiality and integrity impacts.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if the FindFundRaiser.php endpoint reflects user-supplied input from the DateStart and DateEnd parameters into HTML input attributes without proper encoding.

One way to test is to craft a URL with a payload that injects JavaScript event handlers, for example:

  • http://localhost/FindFundRaiser.php?DateStart=%22%20autofocus%20onfocus%3Dalert(document.cookie)%20x%3D%22&DateEnd=test

If visiting this URL while authenticated triggers a JavaScript alert or executes arbitrary script, the vulnerability is present.

From a network perspective, monitoring for HTTP requests containing suspicious payloads in the DateStart or DateEnd parameters can help detect exploitation attempts.

Commands to test this manually could include using curl or wget to fetch the URL and inspect the response for unescaped input, for example:

  • curl -i 'http://localhost/FindFundRaiser.php?DateStart=%22%20autofocus%20onfocus%3Dalert(document.cookie)%20x%3D%22&DateEnd=test'

What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade ChurchCRM to version 7.1.0 or later, where this vulnerability has been fixed.

Until the upgrade can be applied, restrict access to the FindFundRaiser.php endpoint to trusted authenticated users only, and educate users to avoid clicking on suspicious or untrusted links.

Additionally, implement web application firewall (WAF) rules to detect and block requests containing suspicious payloads in the DateStart and DateEnd parameters.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The reflected Cross-Site Scripting (XSS) vulnerability in ChurchCRM can lead to the exposure of sensitive session data such as cookies and enable unauthorized actions on behalf of authenticated users.

Such exposure and unauthorized access can compromise the confidentiality and integrity of user data, which may result in non-compliance with data protection regulations like GDPR and HIPAA that require safeguarding personal and sensitive information.

Therefore, this vulnerability poses a risk to compliance with these common standards and regulations by potentially allowing attackers to access or manipulate protected data.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart