CVE-2026-0682

Church Admin <= 5.0.28 - Authenticated (Administrator+) Blind Server-Side Request Forgery via 'audio_url' Parameter

lowServer-Side Request Forgery (SSRF)
2.2
CVSS Score
2.2
CVSS Score
low
Severity
5.0.29
Patched in
1d
Time to patch

Description

The Church Admin plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.0.28 due to insufficient validation of user-supplied URLs in the 'audio_url' parameter. This makes it possible for authenticated attackers, with Administrator-level access, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

CVSS Vector Breakdown

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Unchanged
None
Confidentiality
Low
Integrity
None
Availability

Technical Details

Affected versions<=5.0.28
PublishedJanuary 16, 2026
Last updatedJanuary 17, 2026
Affected pluginchurch-admin

Check if your site is affected.

Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.