ChurchCRM CVE-2026-44548: High-Severity CSRF Allows Silent Record Deletion
The National Vulnerability Database (NVD) has detailed CVE-2026-44548, a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting ChurchCRM, an open-source church management system. Prior to version 7.3.2, this flaw allows an attacker to craft a malicious page that, when visited by a logged-in ChurchCRM user, silently triggers the deletion of critical records.
The vulnerability specifically targets FundRaiserDelete.php, PropertyTypeDelete.php, and NoteDelete.php. A user with the relevant role, simply by navigating from an attacker-controlled page, could inadvertently delete records. This includes not just the primary records but also any cascaded property and record-to-property assignments, leading to significant data loss without user interaction or consent. The NVD assigned a CVSS score of 8.1 (HIGH), underscoring the severity.
This isn’t just about deleting a single entry; the cascaded deletion means an attacker could wipe out entire categories of data, crippling administrative functions. The attacker’s calculus here is simple: leverage a user’s existing authenticated session to perform unauthorized actions. It’s a classic CSRF scenario, but the impact of silent, irreversible deletion is substantial for any organization relying on this system.
What This Means For You
- If your organization uses ChurchCRM, you are directly exposed to unauthenticated data deletion. This isn't a theoretical risk; an attacker can exploit this with a simple link. Immediately verify your ChurchCRM version. If it's prior to 7.3.2, you must upgrade to 7.3.2 or later without delay to mitigate this high-severity CSRF vulnerability.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
ChurchCRM CVE-2026-44548: Cross-Site Request Forgery for Record Deletion (Free Tier)
title: ChurchCRM CVE-2026-44548: Cross-Site Request Forgery for Record Deletion (Free Tier)
id: scw-2026-05-12-ai-1
status: experimental
level: high
description: |
Detects attempts to exploit ChurchCRM CVE-2026-44548 by triggering GET requests to specific delete endpoints (FundRaiserDelete.php, PropertyTypeDelete.php, NoteDelete.php). This indicates a potential Cross-Site Request Forgery (CSRF) attack aiming for silent record deletion by an authenticated user.
author: SCW Feed Engine (AI-generated)
date: 2026-05-12
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-44548/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|endswith:
- 'FundRaiserDelete.php'
- 'PropertyTypeDelete.php'
- 'NoteDelete.php'
cs-method:
- 'GET'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-44548 | CSRF | ChurchCRM < 7.3.2 |
| CVE-2026-44548 | CSRF | Vulnerable endpoint: FundRaiserDelete.php |
| CVE-2026-44548 | CSRF | Vulnerable endpoint: PropertyTypeDelete.php |
| CVE-2026-44548 | CSRF | Vulnerable endpoint: NoteDelete.php |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 13, 2026 at 02:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.