CVE-2024-31281

6.3 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the Church Admin WordPress plugin that allows attackers to exploit incorrectly configured access control security levels. It affects all versions up to and including 4.1.6, potentially enabling unauthorized users to access privileged functionality.

💻 Affected Systems

Products:
  • WordPress Church Admin plugin
Versions: n/a through 4.1.6
Operating Systems: All platforms running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations using vulnerable versions of the Church Admin plugin regardless of other security configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could gain administrative access to the WordPress site, modify church data, access sensitive member information, or install malicious plugins/themes.

🟠

Likely Case

Unauthorized users accessing church member data, modifying event schedules, or changing donation records without proper authentication.

🟢

If Mitigated

With proper access controls and network segmentation, impact would be limited to the specific plugin functionality with no lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Broken access control vulnerabilities are typically easy to exploit once the specific endpoints are identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 4.1.6

Vendor Advisory: https://patchstack.com/database/vulnerability/church-admin/wordpress-church-admin-plugin-4-1-6-broken-access-control-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find Church Admin plugin
4. Click 'Update Now' if available
5. Alternatively, download latest version from WordPress repository and replace plugin files

🔧 Temporary Workarounds

Disable Church Admin Plugin

all

Temporarily disable the vulnerable plugin until patching is possible

wp plugin deactivate church-admin

Restrict Access via Web Application Firewall

all

Block access to Church Admin endpoints for unauthorized users

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the WordPress instance
  • Enable detailed logging and monitoring for unauthorized access attempts to Church Admin endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Church Admin version number

Check Version:

wp plugin get church-admin --field=version

Verify Fix Applied:

Verify Church Admin plugin version is greater than 4.1.6

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to /wp-content/plugins/church-admin/ endpoints
  • Multiple failed authentication attempts followed by successful access to admin functions
  • Unusual user role changes or privilege escalations

Network Indicators:

  • HTTP requests to Church Admin endpoints from unauthorized IP addresses
  • Unusual traffic patterns to /wp-admin/admin-ajax.php with church-admin parameters

SIEM Query:

source="wordpress.log" AND ("church-admin" OR "church_admin") AND (response_code=200 OR response_code=302) AND user_role!="administrator"

🔗 References

📤 Share & Export