CVE-2026-39330
Published: 07 April 2026
Summary
CVE-2026-39330 is a high-severity SQL Injection (CWE-89) vulnerability in Churchcrm Churchcrm. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 11.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the SQL injection by requiring validation and sanitization of the untrusted Value parameter in the /PropertyAssign.php endpoint.
Remediates the specific flaw through timely identification, reporting, and patching to ChurchCRM version 7.1.0 or later.
Enables monitoring of database queries and system activities to identify anomalous SQL injection attempts by authenticated users.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in web application endpoint (/PropertyAssign.php) enables remote exploitation of the public-facing ChurchCRM application over the network.
NVD Description
ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL injection vulnerability was found in the endpoint /PropertyAssign.php in ChurchCRM. Authenticated users with the role Manage Groups & Roles (ManageGroups) and Edit Records (isEditRecordsEnabled) can inject arbitrary SQL…
more
statements through the Value parameter and thus extract and modify information from the database. This vulnerability is fixed in 7.1.0.
Deeper analysisAI
CVE-2026-39330 is an SQL injection vulnerability affecting ChurchCRM, an open-source church management system, in versions prior to 7.1.0. The flaw resides in the /PropertyAssign.php endpoint, where the Value parameter fails to properly sanitize user input, allowing injection of arbitrary SQL statements. Rated at CVSS 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and mapped to CWE-89, it enables high confidentiality, integrity, and availability impacts on the underlying database.
Authenticated users possessing both the Manage Groups & Roles (ManageGroups) permission and the Edit Records (isEditRecordsEnabled) capability can exploit this vulnerability remotely over the network with low complexity and no user interaction required. Successful exploitation allows attackers to extract sensitive data from the database or modify records, potentially leading to unauthorized data access, alteration, or disruption of church management operations.
The ChurchCRM security advisory (GHSA-xq86-jh52-728g) confirms the issue is fully resolved in version 7.1.0, recommending immediate upgrades for affected installations to mitigate the risk. No workarounds are detailed in the provided references.
Details
- CWE(s)