CVE-2026-39342
Received Received - Intake
SQL Injection in ChurchCRM QueryView.php Allows Data Access

Publication date: 2026-04-07

Last updated on: 2026-04-10

Assigner: GitHub, Inc.

Description
ChurchCRM is an open-source church management system. Prior to 7.1.0, the searchwhat parameter via QueryView.php with the QueryID=15 is vulnerable to a SQL injection. The authenticated user requires access to Data/Reports > Query Menu and access to the "Advanced Search" query. This vulnerability is fixed in 7.1.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-07
Last Modified
2026-04-10
Generated
2026-05-07
AI Q&A
2026-04-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
churchcrm churchcrm to 7.1.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-89 The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This SQL injection vulnerability in ChurchCRM allows an attacker with limited privileges to execute arbitrary SQL commands remotely, potentially leading to full database compromise, data leakage, and denial of service.

Such impacts on confidentiality, integrity, and availability of sensitive data can result in non-compliance with common standards and regulations like GDPR and HIPAA, which require protection of personal and sensitive information against unauthorized access and breaches.

Therefore, exploitation of this vulnerability could lead to violations of these regulations due to potential exposure or loss of protected data.


Can you explain this vulnerability to me?

CVE-2026-39342 is a critical SQL injection vulnerability in ChurchCRM versions up to 7.0.5. It affects the `searchwhat` parameter in the `QueryView.php` script when accessed with `QueryID=15`. An authenticated user with access to the Data/Reports > Query Menu and the "Advanced Search" query can exploit this vulnerability.

The vulnerability occurs because the application does not properly sanitize the `searchwhat` parameter, allowing attackers to inject arbitrary SQL commands. This can be exploited remotely via HTTP POST requests without requiring user interaction beyond authentication.

Attackers can execute SQL commands such as time-based blind SQL injection payloads to confirm the vulnerability and extract sensitive data, including the database version and contents.


How can this vulnerability impact me? :

This vulnerability can have a severe impact on the confidentiality, integrity, and availability of your system.

  • Confidentiality: Attackers can extract sensitive data from the database.
  • Integrity: Attackers can execute arbitrary SQL commands, potentially modifying or corrupting data.
  • Availability: Attackers can perform denial of service attacks, for example by using time-based SQL injection payloads to delay or disrupt database responses.

Since the attack requires only low privileges and no user interaction beyond authentication, it poses a high risk to systems running vulnerable versions.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by sending specially crafted POST requests to the vulnerable endpoint and observing the system's response time or behavior.

A proof of concept involves sending a POST request to QueryView.php with QueryID=15 and injecting SQL commands into the searchwhat parameter to cause a delay, confirming SQL injection.

  • Example curl command to test for the vulnerability: curl -X POST 'http://target/QueryView.php?QueryID=15' -d 'searchstring=rbzEWw&searchwhat=(select*from(select(sleep(20)))a)&Submit=Execute+Query'
  • Alternative payloads include conditional sleep statements to infer data via time-based blind SQL injection.
  • PoC scripts in Python and usage examples with Burp Suite are also available for automated testing.

What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to upgrade ChurchCRM/CRM to version 7.1.0 or later, where this vulnerability is fixed.

Additionally, review and sanitize inputs to the searchwhat parameter in QueryView.php to prevent SQL injection.

Implement strict validation and use parameterized queries to ensure user inputs cannot alter SQL commands.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart