Low severity2.2NVD Advisory· Published Jan 17, 2026· Updated Apr 15, 2026
CVE-2026-0682
CVE-2026-0682
Description
The Church Admin plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.0.28 due to insufficient validation of user-supplied URLs in the 'audio_url' parameter. This makes it possible for authenticated attackers, with Administrator-level access, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- plugins.trac.wordpress.org/browser/church-admin/tags/5.0.27/includes/functions.phpnvd
- plugins.trac.wordpress.org/browser/church-admin/tags/5.0.27/includes/sermon-podcast.phpnvd
- plugins.trac.wordpress.org/browser/church-admin/trunk/includes/functions.phpnvd
- plugins.trac.wordpress.org/browser/church-admin/trunk/includes/sermon-podcast.phpnvd
- plugins.trac.wordpress.org/changesetnvd
- www.wordfence.com/threat-intel/vulnerabilities/id/77227fc5-7c38-476d-af4c-4b2ad3dd8420nvd
News mentions
0No linked articles in our index yet.