CVE-2026-0682

low

Description

The Church Admin plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.0.28 due to insufficient validation of user-supplied URLs in the 'audio_url' parameter. This makes it possible for authenticated attackers, with Administrator-level access, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

References

https://www.wordfence.com/threat-intel/vulnerabilities/id/77227fc5-7c38-476d-af4c-4b2ad3dd8420?source=cve

https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3440847%40church-admin&new=3440847%40church-admin&sfp_email=&sfph_mail=

https://plugins.trac.wordpress.org/browser/church-admin/trunk/includes/sermon-podcast.php#L1181

https://plugins.trac.wordpress.org/browser/church-admin/trunk/includes/functions.php#L6297

https://plugins.trac.wordpress.org/browser/church-admin/tags/5.0.27/includes/sermon-podcast.php#L1181

https://plugins.trac.wordpress.org/browser/church-admin/tags/5.0.27/includes/functions.php#L6297

Details

Source: Mitre, NVD

Published: 2026-01-17

Updated: 2026-01-17

Risk Information

CVSS v2

Base Score: 1.7

Vector: CVSS2#AV:N/AC:H/Au:M/C:N/I:P/A:N

Severity: Low

CVSS v3

Base Score: 2.2

Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N

Severity: Low

EPSS

EPSS: 0.00029