CVE-2022-36137: n/a in n/a
ChurchCRM Version 4.4.5 has XSS vulnerabilities that allow attackers to store XSS via location input sHeader.
AI Analysis
Technical Summary
CVE-2022-36137 is a cross-site scripting (XSS) vulnerability identified in ChurchCRM version 4.4.5. The vulnerability arises from improper sanitization of user-supplied input in the 'location' field, specifically the 'sHeader' parameter, allowing an attacker to inject malicious scripts that are stored and later executed in the context of users accessing the affected application. This stored XSS vulnerability can lead to the execution of arbitrary JavaScript code within the victim's browser session. The CVSS 3.1 base score is 4.8 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), requiring user interaction (UI:R), with a scope change (S:C), and limited impact on confidentiality and integrity (C:L, I:L), and no impact on availability (A:N). The vulnerability requires an attacker to have authenticated access with elevated privileges to inject the malicious payload, and the victim must interact with the malicious content for exploitation to succeed. Although no known exploits are currently reported in the wild, the vulnerability is classified under CWE-79, a common and well-understood web application security issue. The absence of vendor or product details beyond ChurchCRM 4.4.5 limits the scope of affected systems, but the vulnerability is significant for organizations using this specific CRM platform for managing church or community-related data. The stored XSS can be leveraged for session hijacking, privilege escalation, or delivering further attacks such as phishing or malware distribution within the trusted application context.
Potential Impact
For European organizations utilizing ChurchCRM 4.4.5, this vulnerability poses a risk primarily to confidentiality and integrity of user sessions and data. Attackers with authenticated access can inject malicious scripts that execute in other users' browsers, potentially stealing session tokens, manipulating displayed data, or performing unauthorized actions on behalf of victims. This can lead to data leakage of sensitive community or member information, reputational damage, and erosion of trust within organizations that rely on ChurchCRM for managing member relations. Given the requirement for high privileges to exploit, the threat is more pronounced if internal users or compromised accounts are leveraged by attackers. The scope change in the CVSS vector indicates that exploitation can affect resources beyond the initially vulnerable component, potentially impacting multiple users or modules within the CRM. While availability is not directly impacted, the indirect consequences of data compromise and trust issues can disrupt organizational operations. The lack of known active exploits reduces immediate risk but does not eliminate the potential for targeted attacks, especially in environments with less stringent access controls or monitoring.
Mitigation Recommendations
Specific mitigation steps include: 1) Immediate upgrade to a patched version of ChurchCRM if available; if no patch exists, implement manual input validation and sanitization on the 'location' input fields, particularly 'sHeader', to neutralize script tags and other malicious payloads. 2) Enforce strict role-based access controls (RBAC) to limit users with high privileges who can input data into vulnerable fields, reducing the attack surface. 3) Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the application context. 4) Conduct regular security audits and penetration testing focusing on input validation and stored XSS vectors. 5) Educate users and administrators about the risks of XSS and encourage cautious handling of unexpected or suspicious content within the CRM. 6) Monitor logs and user activity for unusual behavior that could indicate exploitation attempts. 7) If feasible, implement web application firewalls (WAF) with rules targeting common XSS attack patterns to provide an additional layer of defense. These measures go beyond generic advice by focusing on the specific vulnerable input vector and the operational context of ChurchCRM deployments.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden
CVE-2022-36137: n/a in n/a
Description
ChurchCRM Version 4.4.5 has XSS vulnerabilities that allow attackers to store XSS via location input sHeader.
AI-Powered Analysis
Technical Analysis
CVE-2022-36137 is a cross-site scripting (XSS) vulnerability identified in ChurchCRM version 4.4.5. The vulnerability arises from improper sanitization of user-supplied input in the 'location' field, specifically the 'sHeader' parameter, allowing an attacker to inject malicious scripts that are stored and later executed in the context of users accessing the affected application. This stored XSS vulnerability can lead to the execution of arbitrary JavaScript code within the victim's browser session. The CVSS 3.1 base score is 4.8 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), requiring user interaction (UI:R), with a scope change (S:C), and limited impact on confidentiality and integrity (C:L, I:L), and no impact on availability (A:N). The vulnerability requires an attacker to have authenticated access with elevated privileges to inject the malicious payload, and the victim must interact with the malicious content for exploitation to succeed. Although no known exploits are currently reported in the wild, the vulnerability is classified under CWE-79, a common and well-understood web application security issue. The absence of vendor or product details beyond ChurchCRM 4.4.5 limits the scope of affected systems, but the vulnerability is significant for organizations using this specific CRM platform for managing church or community-related data. The stored XSS can be leveraged for session hijacking, privilege escalation, or delivering further attacks such as phishing or malware distribution within the trusted application context.
Potential Impact
For European organizations utilizing ChurchCRM 4.4.5, this vulnerability poses a risk primarily to confidentiality and integrity of user sessions and data. Attackers with authenticated access can inject malicious scripts that execute in other users' browsers, potentially stealing session tokens, manipulating displayed data, or performing unauthorized actions on behalf of victims. This can lead to data leakage of sensitive community or member information, reputational damage, and erosion of trust within organizations that rely on ChurchCRM for managing member relations. Given the requirement for high privileges to exploit, the threat is more pronounced if internal users or compromised accounts are leveraged by attackers. The scope change in the CVSS vector indicates that exploitation can affect resources beyond the initially vulnerable component, potentially impacting multiple users or modules within the CRM. While availability is not directly impacted, the indirect consequences of data compromise and trust issues can disrupt organizational operations. The lack of known active exploits reduces immediate risk but does not eliminate the potential for targeted attacks, especially in environments with less stringent access controls or monitoring.
Mitigation Recommendations
Specific mitigation steps include: 1) Immediate upgrade to a patched version of ChurchCRM if available; if no patch exists, implement manual input validation and sanitization on the 'location' input fields, particularly 'sHeader', to neutralize script tags and other malicious payloads. 2) Enforce strict role-based access controls (RBAC) to limit users with high privileges who can input data into vulnerable fields, reducing the attack surface. 3) Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the application context. 4) Conduct regular security audits and penetration testing focusing on input validation and stored XSS vectors. 5) Educate users and administrators about the risks of XSS and encourage cautious handling of unexpected or suspicious content within the CRM. 6) Monitor logs and user activity for unusual behavior that could indicate exploitation attempts. 7) If feasible, implement web application firewalls (WAF) with rules targeting common XSS attack patterns to provide an additional layer of defense. These measures go beyond generic advice by focusing on the specific vulnerable input vector and the operational context of ChurchCRM deployments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-07-18T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d983fc4522896dcbf03e2
Added to database: 5/21/2025, 9:09:19 AM
Last enriched: 6/24/2025, 12:56:07 PM
Last updated: 8/11/2025, 11:30:08 PM
Views: 15
Related Threats
CVE-2025-9020: Use After Free in PX4 PX4-Autopilot
LowCVE-2025-8604: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wptb WP Table Builder – WordPress Table Plugin
MediumCVE-2025-9016: Uncontrolled Search Path in Mechrevo Control Center GX V2
HighCVE-2025-8451: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdevteam Essential Addons for Elementor – Popular Elementor Templates & Widgets
MediumCVE-2025-8013: CWE-918 Server-Side Request Forgery (SSRF) in quttera Quttera Web Malware Scanner
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.