Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 14 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phili67
Phili67 ecclesiacrm |
|
| Vendors & Products |
Phili67
Phili67 ecclesiacrm |
Wed, 13 May 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | EcclesiaCRM is CRM Software for church management. In 8.0.0 and earlier, the ValidateInput() function's default case in EcclesiaCRM's query view passes user-supplied POST parameters directly into SQL queries via str_replace without any sanitization, enabling SQL injection through query parameters that use non-standard validation types. This is caused by an incomplete fix for CVE-2026-35184. | |
| Title | Incomplete fix for CVE-2026-35184: SQL Injection in phili67/ecclesiacrm | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-14T13:23:43.151Z
Reserved: 2026-05-06T14:40:00.952Z
Link: CVE-2026-44418
Updated: 2026-05-14T13:23:13.446Z
Status : Deferred
Published: 2026-05-13T21:16:48.913
Modified: 2026-05-14T17:00:31.310
Link: CVE-2026-44418
No data.
OpenCVE Enrichment
Updated: 2026-05-13T22:45:06Z