CVE-2026-0682
Church Admin <= 5.0.28 - Authenticated (Administrator+) Blind Server-Side Request Forgery via 'audio_url' Parameter
lowServer-Side Request Forgery (SSRF)
2.2
CVSS Score
2.2
CVSS Score
low
Severity
5.0.29
Patched in
1d
Time to patch
Description
The Church Admin plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.0.28 due to insufficient validation of user-supplied URLs in the 'audio_url' parameter. This makes it possible for authenticated attackers, with Administrator-level access, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
CVSS Vector Breakdown
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:NAttack Vector
Network
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Unchanged
None
Confidentiality
Low
Integrity
None
Availability
Technical Details
Affected versions
<=5.0.28PublishedJanuary 16, 2026
Last updatedJanuary 17, 2026
Affected pluginchurch-admin
Check if your site is affected.
Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.