Vulnerability Description
ChurchCRM is an open-source church management system. Prior to 7.1.0, an XSS vulnerability allows attacker-supplied input sent via a the EName and EDesc parameters in EditEventAttendees.php to be rendered in a page without proper output encoding, enabling arbitrary JavaScript execution in victims' browsers. This vulnerability is fixed in 7.1.0.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Churchcrm | Churchcrm | < 7.1.0 |
Related Weaknesses (CWE)
References
- https://github.com/ChurchCRM/CRM/commit/d2f7f36e2ea342419026ddc4bc4ea8efbf5e7e98Patch
- https://github.com/ChurchCRM/CRM/releases/tag/7.1.0ProductRelease Notes
- https://github.com/ChurchCRM/CRM/security/advisories/GHSA-4mqw-9jww-2c58ExploitVendor Advisory
- https://github.com/ChurchCRM/CRM/security/advisories/GHSA-4mqw-9jww-2c58ExploitVendor Advisory
FAQ
What is CVE-2026-39941?
CVE-2026-39941 is a vulnerability with a CVSS score of 6.1 (MEDIUM). ChurchCRM is an open-source church management system. Prior to 7.1.0, an XSS vulnerability allows attacker-supplied input sent via a the EName and EDesc parameters in EditEventAttendees.php to be rend...
How severe is CVE-2026-39941?
CVE-2026-39941 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-39941?
Check the references section above for vendor advisories and patch information. Affected products include: Churchcrm Churchcrm.