LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-39331

CVE-2026-39331 - Vulnerability Analysis

HighCVSS: 8.1

Last Updated: April 7, 2026

ChurchCRM - Broken Access Control

Published: April 7, 2026Updated: April 7, 2026Remote Exploitable

Overview

ChurchCRM < 7.1.0 contains a broken access control vulnerability caused by lack of role-based access control on family record modification endpoints, letting authenticated API users modify any family record state without proper authorization, exploit requires authenticated API user.

Severity & Score

Severity: High
CVSS Score: 8.1

Impact

Authenticated users can modify any family record state, potentially leading to unauthorized data changes and misuse of system functions.

Mitigation

Update to version 7.1.0 or later.

Details

CVE ID
CVE-2026-39331
Severity
High
CVSS Score
8.1
Type
broken_access_control
Status
new

CWE

  • CWE-639

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H