Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2991 articles · 105163 vulns · 36/41 feeds (7d)
← Back to list
8.8
CVE-2026-35567EXPLOITED
churchcrm · crm

SQL Injection in MemberRoleChange.php

Description

ChurchCRM is an open-source church management system. Prior to 7.1.0, the NewRole POST parameter in src/MemberRoleChange.php is used in an SQL query without proper integer validation, allowing authenticated users to inject arbitrary SQL. The attack requires an authenticated session with ManageGroups role, knowledge of a valid GroupID and PersonID (obtainable from GroupView or PersonView pages) This vulnerability is fixed in 7.1.0.

Affected Products

VendorProductVersions
churchcrmcrm< 7.1.0

References

  • https://github.com/ChurchCRM/CRM/security/advisories/GHSA-5f97-jgg4-gqwr(x_refsource_CONFIRM)

Related News (1 articles)

Tier C
VulDB7h ago
CVE-2026-35567 | ChurchCRM up to 7.0.x PersonView Page src/MemberRoleChange.php src sql injection
→ No new info (linked only)
CVSS 3.18.8 HIGH
VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-89
PublishedApr 7, 2026
Last enriched6h agov2
Trending Score58
Source articles1
Independent1
Info Completeness8/14
Missing: epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-39330EXP
ChurchCRM has a Blind SQL injection in PropertyAssign.php
Trending: 62
CRITICALCVE-2026-39334EXP
ChurchCRM has a Blind SQL injection in SettingsIndividual.php
Trending: 62
HIGHCVE-2026-39327EXP
ChurchCRM has a SQL injection in MemberRoleChange.php
Trending: 59
HIGHCVE-2026-39326EXP
ChurchCRM has a Blind SQL injection in PropertyTypeEditor.php
Trending: 59
HIGHCVE-2026-39329EXP
ChurchCRM has a Blind SQL injection in EventNames.php
Trending: 59

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 7, 2026
Discovered by ZDM
Apr 7, 2026
Updated: description, severity, activelyExploited
Apr 7, 2026
Actively Exploited
Apr 7, 2026

Version History

v2
Last enriched 6h ago
v2Tier C6h ago

Updated description with new details, changed severity to CRITICAL, and marked as actively exploited.

descriptionseverityactivelyExploited
via VulDB
v17h ago

Initial creation