Back to CVE risk briefs

External risk intelligence

ChurchCRM could allow external attackers to take control of the system.

ChurchCRM could allow external attackers to gain admin access and take control of the server, potentially exposing sensitive customer data and disrupting operational systems. While this flaw allows for remote control over the software, there are currently no reported signs of active exploitation.

NVD published May 12, 2026 (2 days ago)

External risk briefCRITICAL

CVE-2026-42288

Halo Surface Signal

3/ 5

The flaw exists in the setup wizard of a web-based management application. Setup interfaces are typically temporary components used for initial configuration and are usually disabled, restricted, or placed behind access controls post-installation, meaning persistent public internet exposure is not the standard deployment pattern for this specific component.

Exposure facts

H – Horizon Alert

A security vulnerability has been identified within the ChurchCRM management system affecting the initial setup wizard. Due to an incomplete fix for a prior security issue, the system fails to properly handle database passwords, allowing unauthorized actors to execute code on the server without prior authentication. This flaw presents a significant risk, as it could permit an external party to gain remote control over the software. Consequently, this could lead to a full compromise of the system and the sensitive data managed within it.

A – Asset Exposure

This vulnerability affects organizations utilizing ChurchCRM, specifically regarding the application's setup components. If the setup interface remains reachable, unauthorized external attackers could leverage this flaw to gain admin access to the server hosting your management environment. This exposure may grant an intruder full control over the system, potentially compromising sensitive customer data and disrupting critical operational systems.

L – Live Threat

Currently, there are no reported signs of active exploitation or known targeting associated with this vulnerability. While the flaw is noted to be fully exploitable, the available context does not provide evidence of attackers currently leveraging it in the wild. Consequently, there is no indication of immediate, active threat activity regarding this issue.

O – Operational Fix

To address the identified security risk, please coordinate with your IT team to update your ChurchCRM installation to the latest available release. This update includes the necessary configuration fixes to fully resolve the vulnerability within the setup wizard. We recommend prioritizing this maintenance to ensure your systems remain secure and operational.

References