Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total2
Critical0
High0
Medium1
Reset
Showing 1-2 of 2 records
Threat Entry Updated 2026-04-15

CVE-2026-0682 - Church Admin Plugin

The Church Admin plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.0.28 due to insufficient validation of user-supplied URLs in the 'audio_url' parameter. This makes it possible for authenticated attackers, with Administrator-level access, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

PLUGIN Church Admin

CVE-2026-0682

LOW CVSS 2.2 2026-01-17
Threat Entry Updated 2024-11-21

CVE-2022-0833 - Church Admin Plugin

The Church Admin WordPress plugin before 3.4.135 does not have authorisation and CSRF in some of its action as well as requested files, allowing unauthenticated attackers to repeatedly request the "refresh-backup" action, and simultaneously keep requesting a publicly accessible temporary file generated by the plugin in order to disclose the final backup filename, which can then be fetched by the attacker to download the backup of the plugin's DB data

PLUGIN Church Admin

CVE-2022-0833

MEDIUM CVSS 4.3 2022-03-28
Scroll to top