CVE-2026-39318
Published: 07 April 2026
Summary
CVE-2026-39318 is a high-severity SQL Injection (CWE-89) vulnerability in Churchcrm Churchcrm. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 11.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 mandates validation of user inputs like the 'Field' parameter at the affected endpoints to directly prevent SQL injection attacks.
SI-2 requires timely flaw remediation by upgrading to ChurchCRM 7.1.0, which fixes the SQL injection vulnerability in the specified endpoints.
AC-6 enforces least privilege, restricting exploitation of the SQL injection to only authenticated users with ManageGroups or administrative privileges.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in web app endpoints enables remote exploitation of public-facing application to modify database contents.
NVD Description
ChurchCRM is an open-source church management system. Versions prior to 7.1.0 have an SQL injection vulnerability in the endpoints `/GroupPropsFormRowOps.php`, `/PersonCustomFieldsRowOps.php`, and `/FamilyCustomFieldsRowOps.php`. A user has to be authenticated. For `ManageGroups` privileges have to be enabled and for the other…
more
two endpoints the attack has to be executed by an administrative user. These users can inject arbitrary SQL statements through the `Field` parameter and thus modify tables from the database. This vulnerability is fixed in 7.1.0.
Deeper analysisAI
CVE-2026-39318 is an SQL injection vulnerability (CWE-89) affecting ChurchCRM, an open-source church management system, in versions prior to 7.1.0. The flaw exists in the endpoints `/GroupPropsFormRowOps.php`, `/PersonCustomFieldsRowOps.php`, and `/FamilyCustomFieldsRowOps.php`, where the `Field` parameter fails to properly sanitize user input, allowing injection of arbitrary SQL statements that can modify database tables.
Exploitation requires an authenticated user. For `/GroupPropsFormRowOps.php`, the attacker needs the `ManageGroups` privilege enabled, while `/PersonCustomFieldsRowOps.php` and `/FamilyCustomFieldsRowOps.php` require administrative privileges. Successful attacks enable remote modification of database contents over the network with low complexity and no user interaction, achieving high impacts on confidentiality, integrity, and availability, as scored at CVSS 8.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
ChurchCRM advisories on GitHub (GHSA-8r53-w4r6-w62c, GHSA-j3vj-59vv-h4rc) confirm the vulnerability is fixed in version 7.1.0, recommending immediate upgrades for affected installations to mitigate the risk of unauthorized database alterations.
Details
- CWE(s)