Vulnerability Description
ChurchCRM is an open-source church management system. Versions prior to 6.7.2 have a Stored Cross-Site Scripting (XSS) vulnerability occurs in Create Events in Church Calendar. Users with low privileges can create XSS payloads in the Description field. This payload is stored in the database, and when other users view that event (including the admin), the payload is triggered, leading to account takeover. Version 6.7.2 fixes the vulnerability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Churchcrm | Churchcrm | < 6.7.2 |
Related Weaknesses (CWE)
References
- https://github.com/ChurchCRM/CRM/commit/0cd0d211459b8c19509d36b3c1dfcd7f8c10d914Patch
- https://github.com/ChurchCRM/CRM/commit/ec4b16e9a3ca09c8a01a712bcb90579c42f2ba28Patch
- https://github.com/ChurchCRM/CRM/security/advisories/GHSA-49qp-cfqx-c767ExploitVendor Advisory
FAQ
What is CVE-2026-24855?
CVE-2026-24855 is a vulnerability with a CVSS score of 5.4 (MEDIUM). ChurchCRM is an open-source church management system. Versions prior to 6.7.2 have a Stored Cross-Site Scripting (XSS) vulnerability occurs in Create Events in Church Calendar. Users with low privileg...
How severe is CVE-2026-24855?
CVE-2026-24855 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-24855?
Check the references section above for vendor advisories and patch information. Affected products include: Churchcrm Churchcrm.