SB2026050549 - Cross-site request forgery in ChurchCRM



SB2026050549 - Cross-site request forgery in ChurchCRM

Published: May 5, 2026

Security Bulletin ID SB2026050549
CSH Severity
High
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Cross-site request forgery (CVE-ID: N/A)

The vulnerability allows a remote attacker to cause unauthorized deletion of records.

The vulnerability exists due to cross-site request forgery in legacy delete endpoints (FundRaiserDelete.php, PropertyTypeDelete.php, NoteDelete.php) when processing top-level cross-site GET navigations. A remote attacker can induce a logged-in user to follow a crafted link or navigation to cause unauthorized deletion of records.

User interaction is required, and exploitation succeeds only against a logged-in user with the relevant role for the targeted endpoint. The property-type deletion path also removes related properties and record-to-property assignments.


Remediation

Install update from vendor's website.