Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-53795: Missing Authorization in andy_moyle Church Admin

0
Unknown
VulnerabilityCVE-2024-53795cvecve-2024-53795
Published: Fri Dec 06 2024 (12/06/2024, 13:07:39 UTC)
Source: CVE Database V5
Vendor/Project: andy_moyle
Product: Church Admin

Description

Missing Authorization vulnerability in andy_moyle Church Admin church-admin allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Church Admin: from n/a through <= 5.0.8.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 07:13:28 UTC

Technical Analysis

CVE-2024-53795 identifies a missing authorization vulnerability in the Church Admin software developed by andy_moyle, affecting all versions up to and including 5.0.8. The vulnerability arises because certain functionalities within the application are not properly constrained by Access Control Lists (ACLs), allowing unauthorized users to invoke these functions without proper permission checks. This type of vulnerability typically occurs when the application fails to verify whether a user has the necessary privileges before granting access to sensitive operations or data. Since the vulnerability does not require authentication, attackers can potentially exploit it remotely without valid credentials, increasing the attack surface. The Church Admin software is used by religious organizations to manage administrative tasks such as member records, event scheduling, and financial data. Unauthorized access could lead to exposure or manipulation of sensitive personal and financial information, disruption of church operations, and loss of trust. No CVSS score has been assigned yet, and no public exploits are known at this time. However, the nature of the vulnerability suggests a critical lapse in access control mechanisms, which is a fundamental security requirement. The lack of patch links indicates that a fix may not yet be available, emphasizing the need for immediate mitigation strategies by users of the software.

Potential Impact

The primary impact of this vulnerability is unauthorized access to restricted functionalities within Church Admin, potentially leading to data breaches involving sensitive personal and financial information of church members. Attackers could manipulate administrative functions, disrupt church operations, or exfiltrate confidential data. This undermines the confidentiality and integrity of the system and could also affect availability if attackers disrupt normal operations. The ease of exploitation without authentication increases the risk of widespread abuse, especially in organizations that rely heavily on this software for daily management. The reputational damage to affected organizations could be significant, especially given the trust placed in religious institutions. Additionally, regulatory compliance issues may arise if personal data is exposed. Although no known exploits exist yet, the vulnerability presents a clear risk that could be leveraged by opportunistic attackers or insiders.

Mitigation Recommendations

Until an official patch is released, organizations using Church Admin should implement compensating controls such as restricting network access to the application to trusted IP addresses and internal networks only. Employ web application firewalls (WAFs) to detect and block unauthorized access attempts targeting the vulnerable functions. Conduct thorough access reviews to ensure that only authorized personnel have administrative privileges and monitor logs for unusual activity patterns. If possible, disable or limit access to non-essential functionalities that may be affected by the missing authorization. Engage with the vendor or community to obtain updates on patch availability and apply them promptly once released. Additionally, consider isolating the application environment and enforcing multi-factor authentication (MFA) for all users to reduce the risk of unauthorized exploitation. Regular backups and incident response plans should be updated to prepare for potential compromise scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-11-22T13:53:14.144Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7571e6bfc5ba1df05a16

Added to database: 4/1/2026, 7:43:45 PM

Last enriched: 4/2/2026, 7:13:28 AM

Last updated: 4/4/2026, 8:13:55 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses