Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-40484 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: ChurchCRM < 7.2.0 has a critical flaw in its **Database Backup/Restore** feature. πŸ“‰ **Consequences**: Attackers can achieve **Remote Code Execution (RCE)** and **Cross-Site Request Forgery (CSRF)**.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: Two major failures identified: 1️⃣ **Missing File Extension Filtering** (allows uploading malicious files). 2️⃣ **Missing CSRF Token Validation** (allows unauthorized state changes).…

Q3Who is affected? (Versions/Components)

🏒 **Affected Vendor**: ChurchCRM. πŸ“¦ **Product**: CRM System. πŸ“… **Versions**: All versions **prior to 7.2.0**. If you are running 7.1.x or older, you are vulnerable! ⚠️

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: 1️⃣ **RCE**: Execute arbitrary code on the server. 2️⃣ **CSRF**: Trick admins into performing actions.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ” **Exploitation Threshold**: **Medium-High**. The CVSS vector indicates **PR:H** (Privileges Required: High). You likely need valid admin credentials to access the backup/restore function.…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ•΅οΈ **Public Exploit**: **No**. The `pocs` array is empty. No public Proof-of-Concept (PoC) or wild exploitation code is available yet.…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1️⃣ Check your ChurchCRM version (is it < 7.2.0?). 2️⃣ Review access logs for unusual database backup/restore requests. 3️⃣ Scan for the specific backup endpoints if you have admin access.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Official Fix**: **Yes**. Patched in **Version 7.2.0**. πŸ“ **References**: See GitHub Commit `68be1d1` and PR `#8610`. The vendor has acknowledged the issue (GHSA-2932-77f9-62fx) and released a fix. Update immediately!…

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: 1️⃣ **Restrict Access**: Block access to the backup/restore module via firewall/WAF if possible. 2️⃣ **Disable Feature**: If the UI allows, disable the database backup function entirely.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **HIGH**. CVSS Score is **9.8** (Critical). Even though privileges are required, the impact (RCE) is devastating. πŸš€ **Action**: Upgrade to v7.2.0+ **NOW**. Do not delay! Time is of the essence. ⏳