CVE-2022-36136: n/a in n/a
ChurchCRM Version 4.4.5 has XSS vulnerabilities that allow attackers to store XSS via location input Deposit Comment.
AI Analysis
Technical Summary
CVE-2022-36136 is a stored Cross-Site Scripting (XSS) vulnerability identified in ChurchCRM version 4.4.5. The vulnerability arises from improper sanitization of user-supplied input in the 'Deposit Comment' field related to location input. An attacker can exploit this flaw by injecting malicious scripts that are stored on the server and subsequently executed in the browsers of users who view the affected content. This type of vulnerability falls under CWE-79, which is a common web application security weakness allowing attackers to execute arbitrary JavaScript in the context of the victim’s browser session. The CVSS 3.1 base score of 4.8 (medium severity) reflects that the attack vector is network-based (AV:N), requires low attack complexity (AC:L), but requires privileges (PR:H) and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable component. The impact affects confidentiality and integrity to a low degree (C:L, I:L) but does not impact availability (A:N). No known exploits are currently reported in the wild, and no official patches or vendor information are provided. The vulnerability is significant because stored XSS can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of legitimate users, especially in web applications handling sensitive or personal data such as ChurchCRM, which is used by religious organizations for managing member information and donations.
Potential Impact
For European organizations, particularly religious institutions and non-profits using ChurchCRM, this vulnerability poses a risk of unauthorized script execution within their web portals. Exploitation could lead to theft of user credentials, session tokens, or manipulation of user data, potentially undermining trust and privacy. Given that ChurchCRM manages sensitive personal and financial data related to congregants and donations, a successful attack could result in data breaches or fraudulent transactions. The medium severity and requirement for user interaction somewhat limit the risk, but targeted phishing or social engineering could facilitate exploitation. The impact on confidentiality and integrity, although low, is critical in contexts where data protection regulations such as GDPR apply, potentially leading to compliance issues and reputational damage. Additionally, the scope change indicates that the vulnerability could affect multiple components or users beyond the initial point of compromise, increasing the potential reach of an attack within an organization.
Mitigation Recommendations
Organizations using ChurchCRM should immediately review and sanitize all user inputs, especially in the 'Deposit Comment' and location fields, to ensure that scripts or HTML tags are properly escaped or removed. Implementing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting the execution of unauthorized scripts. Since no official patch is currently available, administrators should consider applying custom input validation or disabling the affected input fields temporarily. Regularly updating ChurchCRM to newer versions when patches become available is critical. Additionally, organizations should educate users about the risks of clicking on suspicious links or interacting with untrusted content within the CRM interface. Monitoring web application logs for unusual input patterns or script injections can help detect attempted exploitation. Employing web application firewalls (WAFs) with rules targeting XSS payloads can provide an additional layer of defense. Finally, conducting security assessments and penetration testing focused on input validation can help identify and remediate similar vulnerabilities proactively.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands, Poland
CVE-2022-36136: n/a in n/a
Description
ChurchCRM Version 4.4.5 has XSS vulnerabilities that allow attackers to store XSS via location input Deposit Comment.
AI-Powered Analysis
Technical Analysis
CVE-2022-36136 is a stored Cross-Site Scripting (XSS) vulnerability identified in ChurchCRM version 4.4.5. The vulnerability arises from improper sanitization of user-supplied input in the 'Deposit Comment' field related to location input. An attacker can exploit this flaw by injecting malicious scripts that are stored on the server and subsequently executed in the browsers of users who view the affected content. This type of vulnerability falls under CWE-79, which is a common web application security weakness allowing attackers to execute arbitrary JavaScript in the context of the victim’s browser session. The CVSS 3.1 base score of 4.8 (medium severity) reflects that the attack vector is network-based (AV:N), requires low attack complexity (AC:L), but requires privileges (PR:H) and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable component. The impact affects confidentiality and integrity to a low degree (C:L, I:L) but does not impact availability (A:N). No known exploits are currently reported in the wild, and no official patches or vendor information are provided. The vulnerability is significant because stored XSS can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of legitimate users, especially in web applications handling sensitive or personal data such as ChurchCRM, which is used by religious organizations for managing member information and donations.
Potential Impact
For European organizations, particularly religious institutions and non-profits using ChurchCRM, this vulnerability poses a risk of unauthorized script execution within their web portals. Exploitation could lead to theft of user credentials, session tokens, or manipulation of user data, potentially undermining trust and privacy. Given that ChurchCRM manages sensitive personal and financial data related to congregants and donations, a successful attack could result in data breaches or fraudulent transactions. The medium severity and requirement for user interaction somewhat limit the risk, but targeted phishing or social engineering could facilitate exploitation. The impact on confidentiality and integrity, although low, is critical in contexts where data protection regulations such as GDPR apply, potentially leading to compliance issues and reputational damage. Additionally, the scope change indicates that the vulnerability could affect multiple components or users beyond the initial point of compromise, increasing the potential reach of an attack within an organization.
Mitigation Recommendations
Organizations using ChurchCRM should immediately review and sanitize all user inputs, especially in the 'Deposit Comment' and location fields, to ensure that scripts or HTML tags are properly escaped or removed. Implementing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting the execution of unauthorized scripts. Since no official patch is currently available, administrators should consider applying custom input validation or disabling the affected input fields temporarily. Regularly updating ChurchCRM to newer versions when patches become available is critical. Additionally, organizations should educate users about the risks of clicking on suspicious links or interacting with untrusted content within the CRM interface. Monitoring web application logs for unusual input patterns or script injections can help detect attempted exploitation. Employing web application firewalls (WAFs) with rules targeting XSS payloads can provide an additional layer of defense. Finally, conducting security assessments and penetration testing focused on input validation can help identify and remediate similar vulnerabilities proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-07-18T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d983fc4522896dcbf03d1
Added to database: 5/21/2025, 9:09:19 AM
Last enriched: 6/24/2025, 12:56:22 PM
Last updated: 7/26/2025, 4:32:14 AM
Views: 9
Related Threats
CVE-2025-8690: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in addix Simple Responsive Slider
MediumCVE-2025-8688: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ebernstein Inline Stock Quotes
MediumCVE-2025-8685: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in emilien Wp chart generator
MediumCVE-2025-8621: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in odn Mosaic Generator
MediumCVE-2025-8568: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in prabode GMap Generator
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.