Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30493: Cross-Site Request Forgery (CSRF) in andy_moyle Church Admin

0
Unknown
VulnerabilityCVE-2024-30493cvecve-2024-30493
Published: Fri Mar 29 2024 (03/29/2024, 13:51:02 UTC)
Source: CVE Database V5
Vendor/Project: andy_moyle
Product: Church Admin

Description

Cross-Site Request Forgery (CSRF) vulnerability in andy_moyle Church Admin church-admin.This issue affects Church Admin: from n/a through <= 4.1.7.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 19:38:33 UTC

Technical Analysis

CVE-2024-30493 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Church Admin software developed by andy_moyle, affecting all versions up to 4.1.7. CSRF vulnerabilities occur when a web application does not properly verify that a request made to it originates from an authenticated and authorized user, allowing attackers to craft malicious web pages or links that cause authenticated users to unknowingly execute unwanted actions. In this case, the vulnerability enables attackers to exploit the trust a Church Admin instance places in the user's browser by sending unauthorized commands, such as modifying data or changing settings, without the user's explicit consent. The vulnerability does not require prior authentication by the attacker but does require the victim to be logged into the Church Admin application. No CVSS score has been assigned yet, and no public exploits have been reported, but the vulnerability is publicly disclosed and should be considered serious. The lack of anti-CSRF protections or insufficient validation of request origins in Church Admin is the root cause. Given that Church Admin is used by churches and community organizations to manage sensitive membership and event data, the integrity and confidentiality of this data could be compromised if exploited. The vulnerability's exploitation could lead to unauthorized data changes, potentially undermining trust and operational continuity within affected organizations.

Potential Impact

The primary impact of this CSRF vulnerability is on the integrity and potentially availability of the Church Admin system. Attackers can cause authenticated users to unknowingly perform actions such as modifying membership records, changing event details, or altering administrative settings. This can lead to data corruption, unauthorized disclosure of sensitive information, or disruption of community operations. Since Church Admin is used by churches and community organizations worldwide, exploitation could damage organizational trust and lead to privacy violations. Although no direct confidentiality breach is inherent in CSRF itself, secondary effects such as unauthorized data changes could expose sensitive information or disrupt services. The ease of exploitation—requiring only that the victim visit a malicious site while logged in—makes this vulnerability particularly dangerous. Organizations relying on Church Admin without proper CSRF protections are at risk of targeted attacks or opportunistic exploitation, especially in environments where users frequently access the application via web browsers.

Mitigation Recommendations

To mitigate CVE-2024-30493, organizations should immediately upgrade Church Admin to a version that includes a fix once available. In the absence of an official patch, administrators should implement the following measures: 1) Deploy web application firewalls (WAFs) with rules to detect and block CSRF attack patterns targeting Church Admin endpoints. 2) Enforce strict same-site cookie attributes (SameSite=Lax or Strict) to reduce the risk of cross-origin requests. 3) Educate users to log out of Church Admin when not in use and avoid visiting untrusted websites while authenticated. 4) If possible, implement additional request validation mechanisms such as custom headers or tokens to verify legitimate requests. 5) Monitor logs for unusual activity that may indicate exploitation attempts. 6) Restrict access to Church Admin interfaces to trusted networks or VPNs to limit exposure. These steps, combined with prompt patching, will significantly reduce the risk posed by this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-03-27T10:20:23.964Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd741ee6bfc5ba1def547d

Added to database: 4/1/2026, 7:38:06 PM

Last enriched: 4/1/2026, 7:38:33 PM

Last updated: 4/4/2026, 8:16:34 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses