CVE-2026-39344: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in ChurchCRM CRM
ChurchCRM is an open-source church management system. Prior to 7.1.0, there is a Reflected Cross-Site Scripting (XSS) vulnerability on the login page, which is caused by the lack of sanitization or encoding of the username parameter received from the URL. The username parameter value is directly displayed in the login page input element without filter, allowing attackers to insert malicious JavaScript scripts. If successful, script can be executed on the client side, potentially stealing sensitive data such as session cookies or replacing the display to show the attacker's login form. This vulnerability is fixed in 7.1.0.
AI Analysis
Technical Summary
CVE-2026-39344 is a reflected XSS vulnerability in ChurchCRM's login page affecting versions before 7.1.0. The issue arises from improper neutralization of script-related HTML tags (CWE-80) and improper input sanitization (CWE-79) of the username parameter passed via URL. This parameter is directly injected into the login page's input element without filtering or encoding, enabling attackers to inject malicious scripts that execute in the victim's browser. The vulnerability has a CVSS 3.0 score of 8.1, indicating high severity. The flaw is resolved in ChurchCRM version 7.1.0.
Potential Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the victim's browser session on the login page. This can lead to theft of sensitive information such as session cookies or manipulation of the login interface to deceive users. There is no indication of impact on system availability or integrity beyond client-side script execution.
Mitigation Recommendations
This vulnerability is fixed in ChurchCRM version 7.1.0. Users and administrators should upgrade to version 7.1.0 or later to remediate this issue. No official patch or temporary workaround is indicated in the advisory. Until upgraded, users should exercise caution when interacting with login URLs containing username parameters from untrusted sources.
CVE-2026-39344: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in ChurchCRM CRM
Description
ChurchCRM is an open-source church management system. Prior to 7.1.0, there is a Reflected Cross-Site Scripting (XSS) vulnerability on the login page, which is caused by the lack of sanitization or encoding of the username parameter received from the URL. The username parameter value is directly displayed in the login page input element without filter, allowing attackers to insert malicious JavaScript scripts. If successful, script can be executed on the client side, potentially stealing sensitive data such as session cookies or replacing the display to show the attacker's login form. This vulnerability is fixed in 7.1.0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-39344 is a reflected XSS vulnerability in ChurchCRM's login page affecting versions before 7.1.0. The issue arises from improper neutralization of script-related HTML tags (CWE-80) and improper input sanitization (CWE-79) of the username parameter passed via URL. This parameter is directly injected into the login page's input element without filtering or encoding, enabling attackers to inject malicious scripts that execute in the victim's browser. The vulnerability has a CVSS 3.0 score of 8.1, indicating high severity. The flaw is resolved in ChurchCRM version 7.1.0.
Potential Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the victim's browser session on the login page. This can lead to theft of sensitive information such as session cookies or manipulation of the login interface to deceive users. There is no indication of impact on system availability or integrity beyond client-side script execution.
Mitigation Recommendations
This vulnerability is fixed in ChurchCRM version 7.1.0. Users and administrators should upgrade to version 7.1.0 or later to remediate this issue. No official patch or temporary workaround is indicated in the advisory. Until upgraded, users should exercise caution when interacting with login URLs containing username parameters from untrusted sources.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-04-06T20:28:38.394Z
- Cvss Version
- 3.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69d549eeaaed68159a473968
Added to database: 4/7/2026, 6:16:14 PM
Last enriched: 4/7/2026, 6:31:09 PM
Last updated: 4/8/2026, 6:24:08 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.