ChurchCRM is an open-source church management system. Versions prior to 7.0.2 allow an admin user to edit JSON type system settings to store a JavaScript payload that can execute when any admin views the system settings. The JSON input is left unescaped/unsanitized in SystemSettings.php, leading to XSS. This issue has been fixed in version 7.0.2.
References
| Link | Resource |
|---|---|
| https://github.com/ChurchCRM/CRM/security/advisories/GHSA-7gq6-xmpx-qc7c | Exploit Mitigation Vendor Advisory |
| https://github.com/ChurchCRM/CRM/security/advisories/GHSA-7gq6-xmpx-qc7c | Exploit Mitigation Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-20 02:16
Updated : 2026-03-23 15:29
NVD link : CVE-2026-32880
Mitre link : CVE-2026-32880
CVE.ORG link : CVE-2026-32880
JSON object : View
Products Affected
churchcrm
- churchcrm
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
