Back to CVE risk briefs

External risk intelligence

ChurchCRM could allow external attackers to expose sensitive member data

ChurchCRM could allow external attackers to gain administrative control, potentially exposing sensitive member data. This vulnerability affects public-facing components and proof-of-concept code is available.

NVD published May 12, 2026 (2 days ago)

External risk briefCRITICAL

CVE-2026-44547

Halo Surface Signal

4/ 5

The vulnerability exists in a public-facing API route of ChurchCRM. As a web-based platform designed for managing church operations and user data, it is commonly deployed as an internet-accessible web application, making its public-facing components frequently reachable in real-world environments.

Exposure facts

H – Horizon Alert

ChurchCRM, a system used to manage church operations, contains a security gap because a planned protective update was accidentally removed before the software was released. This oversight leaves the system susceptible to the specific security risk the update was designed to address. Consequently, this could potentially expose sensitive data or compromise the integrity of the management platform.

A – Asset Exposure

This vulnerability affects ChurchCRM, an open-source platform used for managing church operations and member data. The issue is located within a public-facing user component, which may be reachable over the internet depending on your specific deployment. If utilized by unauthorized parties, this could lead to the exposure of sensitive user information or unauthorized access to administrative controls within the system.

L – Live Threat

Analysis indicates that public proof-of-concept code is available for this vulnerability, as it remains exploitable by materials published with an original advisory. While this availability increases the potential for exploitability, there is no current evidence of active exploitation or known malicious targeting. The provided context confirms that the issue is accessible to those utilizing the referenced proof-of-concept materials.

O – Operational Fix

To address this security gap, please update your ChurchCRM installation to the latest available release. This action restores the necessary security hardening measures that were inadvertently omitted in recent updates. We recommend scheduling this maintenance with your technical team to ensure your software is current and properly secured.

References