CVE-2026-40480
Severity CVSS v4.0:
HIGH
Type:
Unavailable / Other
Publication date:
18/04/2026
Last modified:
20/04/2026
Description
ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the GET /api/person/{personId} endpoint loads and returns person records without performing object-level authorization checks. Although the legacy PersonView.php page enforces canEditPerson() restrictions, the API layer omits this check. Any authenticated user with only EditSelf privileges can enumerate and read other members' records, exposing sensitive PII including names, addresses, phone numbers, and email addresses. This issue has been fixed in version 7.2.0.
Impact
Base Score 4.0
7.10
Severity 4.0
HIGH
References to Advisories, Solutions, and Tools
- https://github.com/ChurchCRM/CRM/commit/28ea7a2965fc2fe30e150fadb1ae38a97f8225c2
- https://github.com/ChurchCRM/CRM/issues/8617
- https://github.com/ChurchCRM/CRM/pull/8616
- https://github.com/ChurchCRM/CRM/security/advisories/GHSA-5w59-32c8-933v
- https://github.com/ChurchCRM/CRM/security/advisories/GHSA-5w59-32c8-933v



