Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0682: CWE-918 Server-Side Request Forgery (SSRF) in andy_moyle Church Admin

0
Low
VulnerabilityCVE-2026-0682cvecve-2026-0682cwe-918
Published: Sat Jan 17 2026 (01/17/2026, 03:24:24 UTC)
Source: CVE Database V5
Vendor/Project: andy_moyle
Product: Church Admin

Description

The Church Admin plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.0.28 due to insufficient validation of user-supplied URLs in the 'audio_url' parameter. This makes it possible for authenticated attackers, with Administrator-level access, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

AI-Powered Analysis

AILast updated: 01/24/2026, 19:50:02 UTC

Technical Analysis

CVE-2026-0682 identifies a Server-Side Request Forgery (SSRF) vulnerability in the Church Admin plugin for WordPress, maintained by andy_moyle. The vulnerability exists in all versions up to and including 5.0.28 due to insufficient validation of user-supplied URLs in the 'audio_url' parameter. An attacker with Administrator-level access can exploit this flaw to cause the web application to send HTTP requests to arbitrary internal or external locations. SSRF vulnerabilities are dangerous because they allow attackers to bypass network access controls and interact with internal services that are otherwise inaccessible externally. In this case, the attacker can query or modify internal resources, potentially leading to further compromise or data leakage. However, exploitation requires authenticated access with high privileges, limiting the attack surface. The CVSS v3.1 score is 2.2, reflecting low severity due to the requirement for administrator privileges, high attack complexity, and lack of direct confidentiality or availability impact. No public exploits have been reported, and no patches are currently linked, indicating that mitigation may rely on access control and input validation improvements. The vulnerability is categorized under CWE-918 (SSRF), emphasizing the need for strict validation of URLs and network request origins in web applications.

Potential Impact

For European organizations, the primary impact of this vulnerability lies in the potential for internal network reconnaissance and manipulation by malicious insiders or compromised administrator accounts. Religious institutions or community organizations using the Church Admin plugin on WordPress sites could face unauthorized access to internal services, leading to information disclosure or unauthorized changes. Although the vulnerability does not directly compromise confidentiality or availability, it can serve as a pivot point for attackers to escalate privileges or move laterally within the network. Given the requirement for administrator-level access, the risk is mitigated if organizations enforce strong access controls and monitor privileged user activities. However, failure to do so could allow attackers to exploit internal services that are otherwise protected by network segmentation or firewalls. The impact is thus more significant in environments where internal services hold sensitive data or critical functions. Additionally, the lack of known exploits reduces immediate risk but does not eliminate the threat of future exploitation.

Mitigation Recommendations

1. Restrict Administrator Access: Limit the number of users with Administrator privileges on WordPress sites using the Church Admin plugin and enforce strong authentication mechanisms such as multi-factor authentication (MFA). 2. Input Validation: Implement strict validation and sanitization of the 'audio_url' parameter to ensure only safe and expected URLs are accepted, ideally restricting requests to trusted domains or disallowing external URLs altogether. 3. Network Segmentation: Ensure that internal services are segmented and not accessible from the web server hosting WordPress to reduce the impact of SSRF exploitation. 4. Monitoring and Logging: Enable detailed logging of outbound HTTP requests from the web server and monitor for unusual or unauthorized requests that could indicate SSRF attempts. 5. Plugin Updates: Monitor for official patches or updates from the plugin vendor and apply them promptly once available. 6. Web Application Firewall (WAF): Deploy a WAF with rules to detect and block SSRF patterns, especially those targeting internal IP ranges or unusual URL parameters. 7. Security Awareness: Educate administrators about the risks of SSRF and the importance of cautious plugin usage and parameter handling.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-07T18:03:26.237Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696b0749b22c7ad868788fd3

Added to database: 1/17/2026, 3:51:37 AM

Last enriched: 1/24/2026, 7:50:02 PM

Last updated: 2/7/2026, 5:26:00 PM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats