Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37440: Missing Authorization in andy_moyle Church Admin

0
Unknown
VulnerabilityCVE-2024-37440cvecve-2024-37440
Published: Fri Nov 01 2024 (11/01/2024, 14:18:22 UTC)
Source: CVE Database V5
Vendor/Project: andy_moyle
Product: Church Admin

Description

Missing Authorization vulnerability in andy_moyle Church Admin church-admin.This issue affects Church Admin: from n/a through <= 4.4.4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 05:07:35 UTC

Technical Analysis

CVE-2024-37440 identifies a Missing Authorization vulnerability in the Church Admin software developed by andy_moyle, affecting all versions up to 4.4.4. Missing Authorization means that certain functions or endpoints within the application do not properly verify whether a user has the necessary permissions before allowing access or actions. This can lead to unauthorized users performing administrative tasks, viewing sensitive data, or modifying records without authentication or with insufficient privilege checks. The vulnerability was reserved in June 2024 and published in November 2024, with no CVSS score assigned yet and no known public exploits. The absence of patches indicates that users must rely on alternative mitigations until an official fix is released. The issue threatens the confidentiality and integrity of data managed by Church Admin, which is typically used by religious organizations to manage member information, donations, events, and other administrative functions. Exploitation could result in data leakage, unauthorized data modification, or disruption of church administrative operations. Given the software’s niche use case, the attack surface is limited to organizations using this product, but the impact on those organizations can be significant due to the sensitive nature of the data involved.

Potential Impact

The primary impact of this vulnerability is unauthorized access to sensitive church administrative data and unauthorized modification of that data. This can lead to breaches of confidentiality, such as exposure of personal information of church members, financial details, and internal communications. Integrity is also at risk because attackers could alter records, potentially causing operational disruptions or reputational damage. Availability impact is likely limited but could occur if unauthorized changes disrupt normal application functionality. Since the vulnerability involves missing authorization checks, exploitation does not require prior authentication, increasing the risk and ease of attack. Organizations relying on Church Admin for critical administrative functions could face compliance issues, loss of trust, and operational challenges if exploited. Although no known exploits are reported, the vulnerability’s presence in a management tool used by community organizations worldwide makes it a significant concern for affected entities.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict network-level access controls to limit who can reach the Church Admin application, ideally restricting access to trusted IP addresses or VPN users. Employ web application firewalls (WAFs) to detect and block suspicious requests that attempt to access unauthorized endpoints. Conduct thorough access reviews and minimize user privileges within the application to reduce potential damage. Monitor application logs for unusual activity indicative of unauthorized access attempts. If possible, disable or restrict features suspected to be vulnerable. Engage with the vendor or community for updates and apply patches promptly once available. Additionally, consider isolating the application environment and backing up data regularly to enable recovery in case of compromise. Educate users and administrators about the risks and signs of exploitation to enhance detection and response capabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-06-09T08:52:00.672Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7457e6bfc5ba1def6d36

Added to database: 4/1/2026, 7:39:03 PM

Last enriched: 4/2/2026, 5:07:35 AM

Last updated: 4/6/2026, 9:25:16 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses