Skip to main content

CVE-2022-36136: n/a in n/a

Medium
VulnerabilityCVE-2022-36136cvecve-2022-36136n-acwe-79
Published: Tue Nov 29 2022 (11/29/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

ChurchCRM Version 4.4.5 has XSS vulnerabilities that allow attackers to store XSS via location input Deposit Comment.

AI-Powered Analysis

AILast updated: 06/24/2025, 12:56:22 UTC

Technical Analysis

CVE-2022-36136 is a stored Cross-Site Scripting (XSS) vulnerability identified in ChurchCRM version 4.4.5. The vulnerability arises from improper sanitization of user-supplied input in the 'Deposit Comment' field related to location input. An attacker can exploit this flaw by injecting malicious scripts that are stored on the server and subsequently executed in the browsers of users who view the affected content. This type of vulnerability falls under CWE-79, which is a common web application security weakness allowing attackers to execute arbitrary JavaScript in the context of the victim’s browser session. The CVSS 3.1 base score of 4.8 (medium severity) reflects that the attack vector is network-based (AV:N), requires low attack complexity (AC:L), but requires privileges (PR:H) and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable component. The impact affects confidentiality and integrity to a low degree (C:L, I:L) but does not impact availability (A:N). No known exploits are currently reported in the wild, and no official patches or vendor information are provided. The vulnerability is significant because stored XSS can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of legitimate users, especially in web applications handling sensitive or personal data such as ChurchCRM, which is used by religious organizations for managing member information and donations.

Potential Impact

For European organizations, particularly religious institutions and non-profits using ChurchCRM, this vulnerability poses a risk of unauthorized script execution within their web portals. Exploitation could lead to theft of user credentials, session tokens, or manipulation of user data, potentially undermining trust and privacy. Given that ChurchCRM manages sensitive personal and financial data related to congregants and donations, a successful attack could result in data breaches or fraudulent transactions. The medium severity and requirement for user interaction somewhat limit the risk, but targeted phishing or social engineering could facilitate exploitation. The impact on confidentiality and integrity, although low, is critical in contexts where data protection regulations such as GDPR apply, potentially leading to compliance issues and reputational damage. Additionally, the scope change indicates that the vulnerability could affect multiple components or users beyond the initial point of compromise, increasing the potential reach of an attack within an organization.

Mitigation Recommendations

Organizations using ChurchCRM should immediately review and sanitize all user inputs, especially in the 'Deposit Comment' and location fields, to ensure that scripts or HTML tags are properly escaped or removed. Implementing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting the execution of unauthorized scripts. Since no official patch is currently available, administrators should consider applying custom input validation or disabling the affected input fields temporarily. Regularly updating ChurchCRM to newer versions when patches become available is critical. Additionally, organizations should educate users about the risks of clicking on suspicious links or interacting with untrusted content within the CRM interface. Monitoring web application logs for unusual input patterns or script injections can help detect attempted exploitation. Employing web application firewalls (WAFs) with rules targeting XSS payloads can provide an additional layer of defense. Finally, conducting security assessments and penetration testing focused on input validation can help identify and remediate similar vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-07-18T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d983fc4522896dcbf03d1

Added to database: 5/21/2025, 9:09:19 AM

Last enriched: 6/24/2025, 12:56:22 PM

Last updated: 7/26/2025, 4:32:14 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats