[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-40484":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-18T02:14:07.519Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":55,"aliases":56,"duplicate_of":9,"upstream":57,"downstream":58,"duplicates":59,"related":60,"reserved_at":9,"published_at":61,"modified_at":61,"state":62,"summary":63,"references_raw":70,"kevs":86,"epss":9,"epss_history":87,"metrics":88,"affected":96},"CVE-2026-40484","ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the database backup restore functionality extracts uploaded archive contents and copies files from the Images/ directory into the web-accessible document root using recursiveCopyDirectory(), which performs no file extension filtering. An authenticated administrator can upload a crafted backup archive containing a PHP webshell inside the Images/ directory, which is then written to a publicly accessible path and executable via HTTP requests, resulting in remote code execution as the web server user. The restore endpoint also lacks CSRF token validation, enabling exploitation through cross-site request forgery targeting an authenticated administrator. This issue has been fixed in version 7.2.0.",null,[11,32,42],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-269","Improper Privilege Management","The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.","weakness","Draft","Class","Medium",[20,24,28],{"id":21,"name":22,"techniques":23},"CAPEC-122","Privilege Abuse",[],{"id":25,"name":26,"techniques":27},"CAPEC-233","Privilege Escalation",[],{"id":29,"name":30,"techniques":31},"CAPEC-58","Restful Privilege Elevation",[],{"_key":33,"id":33,"name":34,"description":35,"type":15,"status":16,"abstraction":36,"likelihood_of_exploit":18,"capec":37},"CWE-434","Unrestricted Upload of File with Dangerous Type","The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.","Base",[38],{"id":39,"name":40,"techniques":41},"CAPEC-1","Accessing Functionality Not Properly Constrained by ACLs",[],{"_key":43,"id":43,"name":44,"description":45,"type":15,"status":16,"abstraction":36,"likelihood_of_exploit":9,"capec":46},"CWE-552","Files or Directories Accessible to External Parties","The product makes files or directories accessible to unauthorized actors, even though they should not be.",[47,51],{"id":48,"name":49,"techniques":50},"CAPEC-150","Collect Data from Common Resource Locations",[],{"id":52,"name":53,"techniques":54},"CAPEC-639","Probe System Files",[],[],[],[],[],[],[],"2026-04-17T23:25:06.319Z","Received",{"cisa_kev":64,"cisa_ransomware":64,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":65,"severity_score":66,"severity_version":67,"severity_source":68,"severity_vector":69,"severity_status":62},false,"critical",9.1,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",[71,77,82],{"url":72,"sources":73,"tags":75},"https://github.com/ChurchCRM/CRM/security/advisories/GHSA-2932-77f9-62fx",[68,74],"nvd",[76],"X Refsource CONFIRM",{"url":78,"sources":79,"tags":80},"https://github.com/ChurchCRM/CRM/pull/8610",[68,74],[81],"X Refsource MISC",{"url":83,"sources":84,"tags":85},"https://github.com/ChurchCRM/CRM/commit/68be1d12bc4cc1429575ae797ef05efe47030d39",[68,74],[81],[],[],[89,94],{"source":68,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":90,"cvss_v4_0":9},{"baseScore":66,"baseSeverity":91,"vectorString":69,"impactScore":92,"exploitabilityScore":93},"CRITICAL",10,5.9,{"source":74,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":95,"cvss_v4_0":9},{"baseScore":66,"baseSeverity":91,"vectorString":69,"impactScore":92,"exploitabilityScore":93},[97],{"ecosystem":9,"name":98,"vendor":99,"product":100,"cpe_part":101,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":102},"CRM","churchcrm","crm","a",[103],{"version":104,"is_range":105,"range_type":68,"version_start":9,"version_start_type":9,"version_end":106,"version_end_type":107,"fixed_in":9},"\u003C 7.2.0",true,"7.2.0","excluding"]