CVE-2026-35573

🔴 Łataj teraz

Wykorzystanie podatności w ChurchCRM pozwala administratorom na zdalne wykonanie kodu.

CVSS
9.1
EPSS
0.3%
Exploit
poc
Vendor
churchcrm
Opis źródłowy (NVD)

ChurchCRM is an open-source church management system. Prior to 6.5.3, a path traversal vulnerability in ChurchCRM's backup restore functionality allows authenticated administrators to upload arbitrary files and achieve remote code execution by overwriting Apache .htaccess configuration files. The vulnerability exists in src/ChurchCRM/Backup/RestoreJob.php. The $rawUploadedFile['name'] parameter is user-controlled and allows uploading files with arbitrary names to /var/www/html/tmp_attach/ChurchCRMBackups/. This vulnerability is fixed in 6.5.3.

exploit path-traversal rce Brak patcha
Źródła i daty
ŹródłoWartość
NVD – CVSS9.1
CISA KEV (aktywnie wykorzystywane)Nie
FIRST EPSS (prawdopodobieństwo exploita)0.3%
Opublikowano (NVD)2026-04-07 18:16:41 UTC
Ostatnia modyfikacja (NVD)2026-04-10 20:59:20 UTC
Referencje