CVE-2026-40485: CWE-307: Improper Restriction of Excessive Authentication Attempts in ChurchCRM CRM
ChurchCRM versions prior to 7. 2. 0 have an authentication vulnerability in the public API login endpoint that allows unauthenticated attackers to enumerate valid usernames. This is due to distinguishable HTTP response codes (404 vs 401) and lack of rate limiting or account lockout. The issue has been fixed in version 7. 2. 0.
AI Analysis
Technical Summary
The vulnerability in ChurchCRM CRM versions before 7.2.0 involves improper restriction of excessive authentication attempts (CWE-307) and user enumeration (CWE-204) via the public API login endpoint (/api/public/user/login). The endpoint returns different HTTP status codes depending on whether the username exists (404 for non-existent, 401 for incorrect password on existing user), enabling attackers to enumerate valid usernames without any rate limiting or lockout mechanisms. This information disclosure can aid attackers in further attacks. The issue was addressed and fixed in ChurchCRM version 7.2.0.
Potential Impact
An unauthenticated attacker can enumerate valid usernames by analyzing HTTP response codes from the login API endpoint. This information disclosure can facilitate targeted attacks such as credential stuffing or phishing. There is no indication of direct compromise or data loss from this vulnerability alone. The CVSS score is 5.3 (medium severity), reflecting limited confidentiality impact and no integrity or availability impact.
Mitigation Recommendations
Upgrade ChurchCRM to version 7.2.0 or later, where this vulnerability has been fixed. The fix includes uniform HTTP responses for login attempts and implementation of rate limiting or account lockout to prevent username enumeration. No other mitigation is specified or required once the system is updated.
CVE-2026-40485: CWE-307: Improper Restriction of Excessive Authentication Attempts in ChurchCRM CRM
Description
ChurchCRM versions prior to 7. 2. 0 have an authentication vulnerability in the public API login endpoint that allows unauthenticated attackers to enumerate valid usernames. This is due to distinguishable HTTP response codes (404 vs 401) and lack of rate limiting or account lockout. The issue has been fixed in version 7. 2. 0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability in ChurchCRM CRM versions before 7.2.0 involves improper restriction of excessive authentication attempts (CWE-307) and user enumeration (CWE-204) via the public API login endpoint (/api/public/user/login). The endpoint returns different HTTP status codes depending on whether the username exists (404 for non-existent, 401 for incorrect password on existing user), enabling attackers to enumerate valid usernames without any rate limiting or lockout mechanisms. This information disclosure can aid attackers in further attacks. The issue was addressed and fixed in ChurchCRM version 7.2.0.
Potential Impact
An unauthenticated attacker can enumerate valid usernames by analyzing HTTP response codes from the login API endpoint. This information disclosure can facilitate targeted attacks such as credential stuffing or phishing. There is no indication of direct compromise or data loss from this vulnerability alone. The CVSS score is 5.3 (medium severity), reflecting limited confidentiality impact and no integrity or availability impact.
Mitigation Recommendations
Upgrade ChurchCRM to version 7.2.0 or later, where this vulnerability has been fixed. The fix includes uniform HTTP responses for login attempts and implementation of rate limiting or account lockout to prevent username enumeration. No other mitigation is specified or required once the system is updated.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-04-13T19:50:42.114Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69e2c47fbdfbbecc59a12f9e
Added to database: 4/17/2026, 11:38:39 PM
Last enriched: 4/17/2026, 11:53:10 PM
Last updated: 4/18/2026, 3:17:01 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.