CVE-2026-39335: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ChurchCRM CRM
CVE-2026-39335 is a stored cross-site scripting (XSS) vulnerability in ChurchCRM versions prior to 7. 1. 1. It affects the group remove control and family editor state/country fields, primarily allowing an admin user to inject malicious scripts that can impact other admin users. This vulnerability has been fixed in version 7. 1. 1. The CVSS score is 6. 1, indicating a medium severity level.
AI Analysis
Technical Summary
ChurchCRM, an open-source church management system, contained a stored XSS vulnerability (CWE-79) in versions before 7.1.1. The issue arises from improper neutralization of input during web page generation in the group remove control and family editor state/country fields. This vulnerability is mainly exploitable in an admin-to-admin context when writable entity fields are abused. The vulnerability allows injection of malicious scripts that can compromise confidentiality and integrity of admin sessions. The vulnerability was fixed in ChurchCRM version 7.1.1.
Potential Impact
Successful exploitation of this stored XSS vulnerability can lead to the execution of arbitrary scripts in the context of an admin user's browser, potentially compromising sensitive administrative functions and data confidentiality and integrity. The attack requires high privileges (admin) and user interaction (admin user visiting a crafted page). There is no impact on availability. No known exploits in the wild have been reported.
Mitigation Recommendations
Upgrade ChurchCRM to version 7.1.1 or later, where this vulnerability is fixed. Since this is a stored XSS affecting admin users, applying the official patch is the recommended remediation. No alternative mitigations or temporary fixes are documented. Patch status is not explicitly stated but the vendor fixed the issue in 7.1.1, so updating to this version or later is required.
CVE-2026-39335: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ChurchCRM CRM
Description
CVE-2026-39335 is a stored cross-site scripting (XSS) vulnerability in ChurchCRM versions prior to 7. 1. 1. It affects the group remove control and family editor state/country fields, primarily allowing an admin user to inject malicious scripts that can impact other admin users. This vulnerability has been fixed in version 7. 1. 1. The CVSS score is 6. 1, indicating a medium severity level.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
ChurchCRM, an open-source church management system, contained a stored XSS vulnerability (CWE-79) in versions before 7.1.1. The issue arises from improper neutralization of input during web page generation in the group remove control and family editor state/country fields. This vulnerability is mainly exploitable in an admin-to-admin context when writable entity fields are abused. The vulnerability allows injection of malicious scripts that can compromise confidentiality and integrity of admin sessions. The vulnerability was fixed in ChurchCRM version 7.1.1.
Potential Impact
Successful exploitation of this stored XSS vulnerability can lead to the execution of arbitrary scripts in the context of an admin user's browser, potentially compromising sensitive administrative functions and data confidentiality and integrity. The attack requires high privileges (admin) and user interaction (admin user visiting a crafted page). There is no impact on availability. No known exploits in the wild have been reported.
Mitigation Recommendations
Upgrade ChurchCRM to version 7.1.1 or later, where this vulnerability is fixed. Since this is a stored XSS affecting admin users, applying the official patch is the recommended remediation. No alternative mitigations or temporary fixes are documented. Patch status is not explicitly stated but the vendor fixed the issue in 7.1.1, so updating to this version or later is required.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-04-06T20:28:38.393Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69d5874e43e2781bad84f790
Added to database: 4/7/2026, 10:38:06 PM
Last enriched: 4/15/2026, 12:37:58 PM
Last updated: 5/21/2026, 11:50:19 PM
Views: 74
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.