ChurchCRM is an open-source church management system. Prior to 6.5.3, it is possible to trigger server-side HTTP/HTTPS requests to arbitrary hosts (SSRF) by supplying a crafted URL in the Referer request header. The server subsequently makes an outbound request to the attacker-controlled domain, confirmed via OAST. This vulnerability is fixed in 6.5.3.
https://github.com/ChurchCRM/CRM/security/advisories/GHSA-44x3-28jv-mrwq
Published: 2026-04-07
Updated: 2026-04-10
Base Score: 7.3
Vector: CVSS2#AV:N/AC:L/Au:M/C:C/I:P/A:P
Severity: High
Base Score: 6
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L
Severity: Medium
Base Score: 7
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N
Severity: High
EPSS: 0.00036