CVE-2026-35573
🔴 Łataj teraz
Wykorzystanie podatności w ChurchCRM pozwala administratorom na zdalne wykonanie kodu.
CVSS
9.1
EPSS
0.3%
Exploit
poc
Vendor
churchcrm
Opis źródłowy (NVD)
ChurchCRM is an open-source church management system. Prior to 6.5.3, a path traversal vulnerability in ChurchCRM's backup restore functionality allows authenticated administrators to upload arbitrary files and achieve remote code execution by overwriting Apache .htaccess configuration files. The vulnerability exists in src/ChurchCRM/Backup/RestoreJob.php. The $rawUploadedFile['name'] parameter is user-controlled and allows uploading files with arbitrary names to /var/www/html/tmp_attach/ChurchCRMBackups/. This vulnerability is fixed in 6.5.3.
exploit path-traversal rce
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.1 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.3% |
| Opublikowano (NVD) | 2026-04-07 18:16:41 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-10 20:59:20 UTC |
Referencje
- https://github.com/ChurchCRM/CRM/security/advisories/GHSA-r6cr-mvr9-f6wx (security-advisories@github.com) [Exploit, Third Party Advisory]