CVE-2026-39344

HIGH

Reflected XSS the login page through the 'username' parameter

Title source: cna
STIX 2.1

Description

ChurchCRM is an open-source church management system. Prior to 7.1.0, there is a Reflected Cross-Site Scripting (XSS) vulnerability on the login page, which is caused by the lack of sanitization or encoding of the username parameter received from the URL. The username parameter value is directly displayed in the login page input element without filter, allowing attackers to insert malicious JavaScript scripts. If successful, script can be executed on the client side, potentially stealing sensitive data such as session cookies or replacing the display to show the attacker's login form. This vulnerability is fixed in 7.1.0.

Scores

CVSS v3 8.1
EPSS 0.0004
EPSS Percentile 11.3%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-79 CWE-80
Status published
Products (2)
churchcrm/churchcrm < 7.1.0
ChurchCRM/CRM < 7.1.0
Published Apr 07, 2026
Tracked Since Apr 08, 2026