Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0682: CWE-918 Server-Side Request Forgery (SSRF) in andy_moyle Church Admin

0
Low
VulnerabilityCVE-2026-0682cvecve-2026-0682cwe-918
Published: Sat Jan 17 2026 (01/17/2026, 03:24:24 UTC)
Source: CVE Database V5
Vendor/Project: andy_moyle
Product: Church Admin

Description

CVE-2026-0682 is a Server-Side Request Forgery (SSRF) vulnerability affecting the Church Admin WordPress plugin up to version 5. 0. 28. It arises from insufficient validation of user-supplied URLs in the 'audio_url' parameter, allowing authenticated administrators to make arbitrary web requests from the server. Although exploitation requires administrator privileges and has a low CVSS score of 2. 2, it can be leveraged to query or modify internal services not normally accessible externally. No known exploits are currently in the wild, and no patches have been published yet. The vulnerability primarily impacts the integrity of internal systems rather than confidentiality or availability. European organizations using this plugin, especially religious institutions or community groups relying on Church Admin, should be aware of this risk. Mitigation involves restricting administrator access, monitoring internal service requests, and applying updates once available.

AI-Powered Analysis

AILast updated: 01/17/2026, 04:06:16 UTC

Technical Analysis

CVE-2026-0682 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, found in the Church Admin plugin for WordPress, maintained by andy_moyle. This vulnerability exists in all versions up to and including 5.0.28 due to insufficient validation of the 'audio_url' parameter, which accepts user-supplied URLs. An authenticated attacker with Administrator-level privileges can exploit this flaw to cause the web application to send HTTP requests to arbitrary locations, including internal network resources that are otherwise inaccessible externally. This can be used to perform internal reconnaissance, access sensitive internal services, or potentially modify internal data if those services are vulnerable. The vulnerability does not allow unauthenticated exploitation and requires high privileges, limiting its attack surface. The CVSS v3.1 score is 2.2, reflecting low severity due to the requirement for administrator access and the limited impact on confidentiality and availability. No known public exploits or patches are currently available, indicating that exploitation in the wild is not yet observed. However, the vulnerability poses a risk to the integrity of internal systems and could be a stepping stone for further attacks within a compromised environment. The lack of input validation on URLs is a common SSRF vector, and the plugin’s role in managing church-related data means that affected organizations may have sensitive internal networks exposed indirectly through this flaw.

Potential Impact

For European organizations, particularly those using the Church Admin WordPress plugin, this SSRF vulnerability could enable attackers with administrator access to probe and interact with internal network services that are not exposed externally. This can lead to unauthorized modification of internal data or configuration, potentially disrupting church or community management operations. While the direct confidentiality impact is minimal, the integrity of internal services could be compromised, leading to trust issues and operational challenges. The requirement for administrator privileges limits the risk to organizations with strong access controls, but insider threats or compromised administrator accounts could exploit this vulnerability. Given the widespread use of WordPress in Europe and the presence of religious and community organizations relying on Church Admin, the vulnerability could affect a niche but important segment. The absence of known exploits reduces immediate risk, but the potential for lateral movement within networks makes it a concern for internal security posture. Additionally, internal services exposed via SSRF could include sensitive management systems, increasing the potential impact if exploited.

Mitigation Recommendations

1. Restrict Administrator Access: Limit the number of users with administrator privileges to reduce the risk of exploitation. 2. Monitor Internal Requests: Implement logging and monitoring of outbound HTTP requests from the web server to detect unusual or unauthorized internal network access attempts. 3. Network Segmentation: Ensure internal services are properly segmented and protected by firewalls to minimize the impact of SSRF requests. 4. Input Validation: Although no patch is currently available, administrators can implement web application firewall (WAF) rules to block or sanitize requests containing suspicious 'audio_url' parameters. 5. Principle of Least Privilege: Apply least privilege principles to internal services to reduce the potential damage from SSRF exploitation. 6. Update and Patch: Stay alert for official patches or updates from the plugin vendor and apply them promptly once released. 7. Incident Response Preparedness: Prepare for potential incidents involving internal network reconnaissance or modification by having response plans and backups in place. 8. Use Security Plugins: Employ security plugins that can detect and block SSRF attempts or anomalous administrator activities within WordPress.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-07T18:03:26.237Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696b0749b22c7ad868788fd3

Added to database: 1/17/2026, 3:51:37 AM

Last enriched: 1/17/2026, 4:06:16 AM

Last updated: 1/17/2026, 4:56:36 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats