[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-42288":6},{"stargazers_count":4,"fetched_at":5},5,"2026-05-13T10:40:20.565Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":62,"aliases":63,"duplicate_of":9,"upstream":64,"downstream":65,"duplicates":66,"related":67,"reserved_at":9,"published_at":68,"modified_at":68,"state":69,"summary":70,"references_raw":77,"kevs":84,"epss":9,"epss_history":85,"metrics":86,"affected":92},"CVE-2026-42288","ChurchCRM is an open-source church management system. Prior to 7.3.2, The fix for CVE-2026-39337 is incomplete. The pre-authentication remote code execution vulnerability in ChurchCRM's setup wizard via unsanitized DB_PASSWORD remains fully exploitable This vulnerability is fixed in 7.3.2.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-94","Improper Control of Generation of Code ('Code Injection')","The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.","weakness","Draft","Base","Medium",[20,24,58],{"id":21,"name":22,"techniques":23},"CAPEC-242","Code Injection",[],{"id":25,"name":26,"techniques":27},"CAPEC-35","Leverage Executable Code in Non-Executable Files",[28,39,46],{"id":29,"name":30,"tactics":31,"countermeasures":38},"T1027.006","HTML Smuggling",[32,35],{"id":33,"name":34},"TA0030","Defense Evasion",{"id":36,"name":37},"TA0005","Stealth",[],{"id":40,"name":41,"tactics":42,"countermeasures":45},"T1027.009","Embedded Payloads",[43,44],{"id":33,"name":34},{"id":36,"name":37},[],{"id":47,"name":48,"tactics":49,"countermeasures":52},"T1564.009","Resource Forking",[50,51],{"id":33,"name":34},{"id":36,"name":37},[53],{"id":54,"name":55,"tactic":56},"D3-FFV","File Format Verification",{"name":57},"Isolate",{"id":59,"name":60,"techniques":61},"CAPEC-77","Manipulating User-Controlled Variables",[],[],[],[],[],[],[],"2026-05-12T22:25:33.352Z","Received",{"cisa_kev":71,"cisa_ransomware":71,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":72,"severity_score":73,"severity_version":74,"severity_source":75,"severity_vector":76,"severity_status":69},false,"critical",10,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",[78],{"url":79,"sources":80,"tags":82},"https://github.com/ChurchCRM/CRM/security/advisories/GHSA-mp2w-4q3r-ppx7",[75,81],"nvd",[83],"X Refsource CONFIRM",[],[],[87,90],{"source":75,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":88,"cvss_v4_0":9},{"baseScore":73,"baseSeverity":89,"vectorString":76,"impactScore":73,"exploitabilityScore":73},"CRITICAL",{"source":81,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":91,"cvss_v4_0":9},{"baseScore":73,"baseSeverity":89,"vectorString":76,"impactScore":73,"exploitabilityScore":73},[93],{"ecosystem":9,"name":94,"vendor":95,"product":96,"cpe_part":97,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":98},"CRM","churchcrm","crm","a",[99],{"version":100,"is_range":101,"range_type":75,"version_start":9,"version_start_type":9,"version_end":102,"version_end_type":103,"fixed_in":9},"\u003C 7.3.2",true,"7.3.2","excluding"]