{"api_version":"1","generated_at":"2026-04-18T05:18:43+00:00","cve":"CVE-2026-40581","urls":{"html":"https://cve.report/CVE-2026-40581","api":"https://cve.report/api/cve/CVE-2026-40581.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-40581","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-40581"},"summary":{"title":"ChurchCRM: Cross-Site Request Forgery (CSRF) in SelectDelete.php Leading to Permanent Data Deletion","description":"ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the family record deletion endpoint (SelectDelete.php) performs permanent, irreversible deletion of family records and all associated data via a plain GET request with no CSRF token validation. An attacker can craft a malicious page that, when visited by an authenticated administrator, silently triggers deletion of targeted family records including associated notes, pledges, persons, and property data without any user interaction. This issue has been fixed in version 7.2.0.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-04-18 00:16:39","updated_at":"2026-04-18 00:16:39"},"problem_types":["CWE-352","CWE-862","CWE-352 CWE-352: Cross-Site Request Forgery (CSRF)","CWE-862 CWE-862: Missing Authorization"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"8.1","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"8.1","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H","version":"3.1"}}],"references":[{"url":"https://github.com/ChurchCRM/CRM/pull/8613","name":"https://github.com/ChurchCRM/CRM/pull/8613","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/ChurchCRM/CRM/commit/39361628613af7682b813f3e62a412559616d674","name":"https://github.com/ChurchCRM/CRM/commit/39361628613af7682b813f3e62a412559616d674","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/ChurchCRM/CRM/security/advisories/GHSA-6qxv-xw9j-77pj","name":"https://github.com/ChurchCRM/CRM/security/advisories/GHSA-6qxv-xw9j-77pj","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-40581","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-40581","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"ChurchCRM","product":"CRM","version":"affected < 7.2.0","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"product":"CRM","vendor":"ChurchCRM","versions":[{"status":"affected","version":"< 7.2.0"}]}],"descriptions":[{"lang":"en","value":"ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the family record deletion endpoint (SelectDelete.php) performs permanent, irreversible deletion of family records and all associated data via a plain GET request with no CSRF token validation. An attacker can craft a malicious page that, when visited by an authenticated administrator, silently triggers deletion of targeted family records including associated notes, pledges, persons, and property data without any user interaction. This issue has been fixed in version 7.2.0."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-352","description":"CWE-352: Cross-Site Request Forgery (CSRF)","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-862","description":"CWE-862: Missing Authorization","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-17T23:51:32.765Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/ChurchCRM/CRM/security/advisories/GHSA-6qxv-xw9j-77pj","tags":["x_refsource_CONFIRM"],"url":"https://github.com/ChurchCRM/CRM/security/advisories/GHSA-6qxv-xw9j-77pj"},{"name":"https://github.com/ChurchCRM/CRM/pull/8613","tags":["x_refsource_MISC"],"url":"https://github.com/ChurchCRM/CRM/pull/8613"},{"name":"https://github.com/ChurchCRM/CRM/commit/39361628613af7682b813f3e62a412559616d674","tags":["x_refsource_MISC"],"url":"https://github.com/ChurchCRM/CRM/commit/39361628613af7682b813f3e62a412559616d674"}],"source":{"advisory":"GHSA-6qxv-xw9j-77pj","discovery":"UNKNOWN"},"title":"ChurchCRM: Cross-Site Request Forgery (CSRF) in SelectDelete.php Leading to Permanent Data Deletion"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-40581","datePublished":"2026-04-17T23:51:32.765Z","dateReserved":"2026-04-14T13:24:29.475Z","dateUpdated":"2026-04-17T23:51:32.765Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-18 00:16:39","lastModifiedDate":"2026-04-18 00:16:39","problem_types":["CWE-352","CWE-862","CWE-352 CWE-352: Cross-Site Request Forgery (CSRF)","CWE-862 CWE-862: Missing Authorization"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.2}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"40581","Ordinal":"1","Title":"ChurchCRM: Cross-Site Request Forgery (CSRF) in SelectDelete.php","CVE":"CVE-2026-40581","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"40581","Ordinal":"1","NoteData":"ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the family record deletion endpoint (SelectDelete.php) performs permanent, irreversible deletion of family records and all associated data via a plain GET request with no CSRF token validation. An attacker can craft a malicious page that, when visited by an authenticated administrator, silently triggers deletion of targeted family records including associated notes, pledges, persons, and property data without any user interaction. This issue has been fixed in version 7.2.0.","Type":"Description","Title":"ChurchCRM: Cross-Site Request Forgery (CSRF) in SelectDelete.php"}]}}}