Description
The Church Admin plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.0.28 due to insufficient validation of user-supplied URLs in the 'audio_url' parameter. This makes it possible for authenticated attackers, with Administrator-level access, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Problem types
CWE-918 Server-Side Request Forgery (SSRF)
Product status
* (semver)
Timeline
| 2026-01-08: | Vendor Notified |
| 2026-01-16: | Disclosed |
Credits
Phap Nguyen Anh
References
www.wordfence.com/...-7c38-476d-af4c-4b2ad3dd8420?source=cve
plugins.trac.wordpress.org/...nk/includes/sermon-podcast.php
plugins.trac.wordpress.org/...27/includes/sermon-podcast.php
plugins.trac.wordpress.org/...n/trunk/includes/functions.php
plugins.trac.wordpress.org/.../5.0.27/includes/functions.php
plugins.trac.wordpress.org/...ch-admin&sfp_email=&sfph_mail=