CVE-2026-0682: CWE-918 Server-Side Request Forgery (SSRF) in andy_moyle Church Admin
The Church Admin plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.0.28 due to insufficient validation of user-supplied URLs in the 'audio_url' parameter. This makes it possible for authenticated attackers, with Administrator-level access, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
AI Analysis
Technical Summary
CVE-2026-0682 identifies a Server-Side Request Forgery (SSRF) vulnerability in the Church Admin plugin for WordPress, maintained by andy_moyle. The vulnerability exists in all versions up to and including 5.0.28 due to insufficient validation of user-supplied URLs in the 'audio_url' parameter. An attacker with Administrator-level access can exploit this flaw to cause the web application to send HTTP requests to arbitrary internal or external locations. SSRF vulnerabilities are dangerous because they allow attackers to bypass network access controls and interact with internal services that are otherwise inaccessible externally. In this case, the attacker can query or modify internal resources, potentially leading to further compromise or data leakage. However, exploitation requires authenticated access with high privileges, limiting the attack surface. The CVSS v3.1 score is 2.2, reflecting low severity due to the requirement for administrator privileges, high attack complexity, and lack of direct confidentiality or availability impact. No public exploits have been reported, and no patches are currently linked, indicating that mitigation may rely on access control and input validation improvements. The vulnerability is categorized under CWE-918 (SSRF), emphasizing the need for strict validation of URLs and network request origins in web applications.
Potential Impact
For European organizations, the primary impact of this vulnerability lies in the potential for internal network reconnaissance and manipulation by malicious insiders or compromised administrator accounts. Religious institutions or community organizations using the Church Admin plugin on WordPress sites could face unauthorized access to internal services, leading to information disclosure or unauthorized changes. Although the vulnerability does not directly compromise confidentiality or availability, it can serve as a pivot point for attackers to escalate privileges or move laterally within the network. Given the requirement for administrator-level access, the risk is mitigated if organizations enforce strong access controls and monitor privileged user activities. However, failure to do so could allow attackers to exploit internal services that are otherwise protected by network segmentation or firewalls. The impact is thus more significant in environments where internal services hold sensitive data or critical functions. Additionally, the lack of known exploits reduces immediate risk but does not eliminate the threat of future exploitation.
Mitigation Recommendations
1. Restrict Administrator Access: Limit the number of users with Administrator privileges on WordPress sites using the Church Admin plugin and enforce strong authentication mechanisms such as multi-factor authentication (MFA). 2. Input Validation: Implement strict validation and sanitization of the 'audio_url' parameter to ensure only safe and expected URLs are accepted, ideally restricting requests to trusted domains or disallowing external URLs altogether. 3. Network Segmentation: Ensure that internal services are segmented and not accessible from the web server hosting WordPress to reduce the impact of SSRF exploitation. 4. Monitoring and Logging: Enable detailed logging of outbound HTTP requests from the web server and monitor for unusual or unauthorized requests that could indicate SSRF attempts. 5. Plugin Updates: Monitor for official patches or updates from the plugin vendor and apply them promptly once available. 6. Web Application Firewall (WAF): Deploy a WAF with rules to detect and block SSRF patterns, especially those targeting internal IP ranges or unusual URL parameters. 7. Security Awareness: Educate administrators about the risks of SSRF and the importance of cautious plugin usage and parameter handling.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands, Poland, Belgium
CVE-2026-0682: CWE-918 Server-Side Request Forgery (SSRF) in andy_moyle Church Admin
Description
The Church Admin plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.0.28 due to insufficient validation of user-supplied URLs in the 'audio_url' parameter. This makes it possible for authenticated attackers, with Administrator-level access, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
AI-Powered Analysis
Technical Analysis
CVE-2026-0682 identifies a Server-Side Request Forgery (SSRF) vulnerability in the Church Admin plugin for WordPress, maintained by andy_moyle. The vulnerability exists in all versions up to and including 5.0.28 due to insufficient validation of user-supplied URLs in the 'audio_url' parameter. An attacker with Administrator-level access can exploit this flaw to cause the web application to send HTTP requests to arbitrary internal or external locations. SSRF vulnerabilities are dangerous because they allow attackers to bypass network access controls and interact with internal services that are otherwise inaccessible externally. In this case, the attacker can query or modify internal resources, potentially leading to further compromise or data leakage. However, exploitation requires authenticated access with high privileges, limiting the attack surface. The CVSS v3.1 score is 2.2, reflecting low severity due to the requirement for administrator privileges, high attack complexity, and lack of direct confidentiality or availability impact. No public exploits have been reported, and no patches are currently linked, indicating that mitigation may rely on access control and input validation improvements. The vulnerability is categorized under CWE-918 (SSRF), emphasizing the need for strict validation of URLs and network request origins in web applications.
Potential Impact
For European organizations, the primary impact of this vulnerability lies in the potential for internal network reconnaissance and manipulation by malicious insiders or compromised administrator accounts. Religious institutions or community organizations using the Church Admin plugin on WordPress sites could face unauthorized access to internal services, leading to information disclosure or unauthorized changes. Although the vulnerability does not directly compromise confidentiality or availability, it can serve as a pivot point for attackers to escalate privileges or move laterally within the network. Given the requirement for administrator-level access, the risk is mitigated if organizations enforce strong access controls and monitor privileged user activities. However, failure to do so could allow attackers to exploit internal services that are otherwise protected by network segmentation or firewalls. The impact is thus more significant in environments where internal services hold sensitive data or critical functions. Additionally, the lack of known exploits reduces immediate risk but does not eliminate the threat of future exploitation.
Mitigation Recommendations
1. Restrict Administrator Access: Limit the number of users with Administrator privileges on WordPress sites using the Church Admin plugin and enforce strong authentication mechanisms such as multi-factor authentication (MFA). 2. Input Validation: Implement strict validation and sanitization of the 'audio_url' parameter to ensure only safe and expected URLs are accepted, ideally restricting requests to trusted domains or disallowing external URLs altogether. 3. Network Segmentation: Ensure that internal services are segmented and not accessible from the web server hosting WordPress to reduce the impact of SSRF exploitation. 4. Monitoring and Logging: Enable detailed logging of outbound HTTP requests from the web server and monitor for unusual or unauthorized requests that could indicate SSRF attempts. 5. Plugin Updates: Monitor for official patches or updates from the plugin vendor and apply them promptly once available. 6. Web Application Firewall (WAF): Deploy a WAF with rules to detect and block SSRF patterns, especially those targeting internal IP ranges or unusual URL parameters. 7. Security Awareness: Educate administrators about the risks of SSRF and the importance of cautious plugin usage and parameter handling.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-07T18:03:26.237Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696b0749b22c7ad868788fd3
Added to database: 1/17/2026, 3:51:37 AM
Last enriched: 1/24/2026, 7:50:02 PM
Last updated: 2/7/2026, 5:26:00 PM
Views: 60
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2105: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2090: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.