Cyber Posture

CVE-2026-35573

CriticalPublic PoC

Published: 07 April 2026

Published
07 April 2026
Modified
10 April 2026
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0050 66.2th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-35573 is a critical-severity Path Traversal (CWE-22) vulnerability in Churchcrm Churchcrm. Its CVSS base score is 9.1 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked in the top 33.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates path traversal by requiring validation and error handling of the user-controlled $rawUploadedFile['name'] parameter in the backup restore function.

prevent

Requires timely flaw remediation by upgrading to ChurchCRM 6.5.3, which fixes the vulnerability in RestoreJob.php.

prevent

Restricts file names in uploads to safe patterns without traversal characters like '../', preventing arbitrary file placement in the tmp_attach directory.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Path traversal in public-facing web app (ChurchCRM) backup restore allows authenticated admins to overwrite .htaccess for RCE, directly enabling exploitation of public-facing application (T1190) and exploitation for privilege escalation from admin to server-level access (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

ChurchCRM is an open-source church management system. Prior to 6.5.3, a path traversal vulnerability in ChurchCRM's backup restore functionality allows authenticated administrators to upload arbitrary files and achieve remote code execution by overwriting Apache .htaccess configuration files. The vulnerability exists…

more

in src/ChurchCRM/Backup/RestoreJob.php. The $rawUploadedFile['name'] parameter is user-controlled and allows uploading files with arbitrary names to /var/www/html/tmp_attach/ChurchCRMBackups/. This vulnerability is fixed in 6.5.3.

Deeper analysisAI

CVE-2026-35573 is a path traversal vulnerability (CWE-22, CWE-434) in the backup restore functionality of ChurchCRM, an open-source church management system. Versions prior to 6.5.3 are affected, specifically in the src/ChurchCRM/Backup/RestoreJob.php component. The issue stems from the user-controlled $rawUploadedFile['name'] parameter, which allows authenticated administrators to upload files with arbitrary names to the /var/www/html/tmp_attach/ChurchCRMBackups/ directory. This can lead to remote code execution by overwriting Apache .htaccess configuration files. The vulnerability has a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Authenticated administrators with high privileges can exploit this vulnerability remotely with low complexity and no user interaction required. By crafting a malicious backup file upload, attackers can traverse paths to place arbitrary files in sensitive locations, such as overwriting .htaccess files to enable code execution on the server. Successful exploitation grants high confidentiality, integrity, and availability impacts, with a changed scope due to the potential for server-wide effects.

The vulnerability is fixed in ChurchCRM version 6.5.3. Security practitioners should upgrade to this version immediately. Additional details are available in the GitHub security advisory at https://github.com/ChurchCRM/CRM/security/advisories/GHSA-r6cr-mvr9-f6wx.

Details

CWE(s)

Affected Products

churchcrm
churchcrm
≤ 6.5.3

CVEs Like This One

CVE-2025-68109Same product: Churchcrm Churchcrm
CVE-2026-39318Same product: Churchcrm Churchcrm
CVE-2025-11529Same product: Churchcrm Churchcrm
CVE-2026-39327Same product: Churchcrm Churchcrm
CVE-2026-39330Same product: Churchcrm Churchcrm
CVE-2026-39326Same product: Churchcrm Churchcrm
CVE-2026-39334Same product: Churchcrm Churchcrm
CVE-2026-39337Same product: Churchcrm Churchcrm
CVE-2025-62521Same product: Churchcrm Churchcrm
CVE-2026-39341Same product: Churchcrm Churchcrm

References