Skip to content

Add CVE-2026-39339 ChurchCRM API Auth Bypass template#15949

Open
AkhilShekhar wants to merge 1 commit intoprojectdiscovery:mainfrom
AkhilShekhar:add-CVE-2026-39339.yaml
Open

Add CVE-2026-39339 ChurchCRM API Auth Bypass template#15949
AkhilShekhar wants to merge 1 commit intoprojectdiscovery:mainfrom
AkhilShekhar:add-CVE-2026-39339.yaml

Conversation

@AkhilShekhar
Copy link
Copy Markdown

CVE-2026-39339 - ChurchCRM API Authentication Bypass

Summary

ChurchCRM before 7.1.0 allows unauthenticated attackers to bypass
API authentication by including "api/public" anywhere in the request URL.

Affected Versions

All versions before 7.1.0

How it works

The AuthMiddleware checks if the URL contains "api/public" but does
not validate its position — adding ?api/public to any endpoint
bypasses authentication entirely.

Reference

https://nvd.nist.gov/vuln/detail/CVE-2026-39339

@pussycat0x
Copy link
Copy Markdown
Contributor

Hi @AkhilShekhar, thank you for your interest in contributing to this project. During validation, we noticed that the template has weak matchers and is also matching against a honeypot. Additionally, there is no clear proof of concept (PoC) or reference provided for this CVE. Could you please update the template and share a proper reference or PoC?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants