CVE-2024-34828
📋 TL;DR
This Cross-Site Request Forgery (CSRF) vulnerability in the Church Admin WordPress plugin allows attackers to trick authenticated administrators into performing unintended actions. It affects all WordPress sites running Church Admin plugin versions up to 4.1.32. The vulnerability enables attackers to perform actions with the privileges of the logged-in user.
💻 Affected Systems
- WordPress Church Admin plugin
📦 What is this software?
Church Admin by Church Admin Project
⚠️ Risk & Real-World Impact
Worst Case
An attacker could trick an administrator into changing plugin settings, modifying user permissions, or performing other administrative actions that could compromise the site's functionality or security.
Likely Case
Attackers could modify plugin configurations, change user roles, or alter church management data without the administrator's knowledge.
If Mitigated
With proper CSRF protections and user awareness, the risk is significantly reduced as legitimate user interaction is required for exploitation.
🎯 Exploit Status
Exploitation requires the attacker to trick an authenticated user into clicking a malicious link or visiting a compromised page.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.1.33 or later
Vendor Advisory: https://patchstack.com/database/vulnerability/church-admin/wordpress-church-admin-plugin-4-1-32-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Church Admin plugin. 4. Click 'Update Now' if available. 5. Alternatively, download version 4.1.33+ from WordPress repository and manually update.
🔧 Temporary Workarounds
Implement CSRF Tokens
allAdd CSRF protection to Church Admin forms if custom modifications are possible
Use Security Plugins
allInstall WordPress security plugins that provide CSRF protection
🧯 If You Can't Patch
- Temporarily disable the Church Admin plugin until patching is possible
- Implement strict access controls and educate users about CSRF risks
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Installed Plugins → Church Admin version
Check Version:
wp plugin list --name=church-admin --field=version
Verify Fix Applied:
Verify Church Admin plugin version is 4.1.33 or higher
📡 Detection & Monitoring
Log Indicators:
- Unexpected administrative actions in WordPress logs
- Multiple failed CSRF token validations
Network Indicators:
- Requests to Church Admin endpoints without proper referrer headers
- Suspicious cross-origin requests
SIEM Query:
source="wordpress" AND (plugin="church-admin" AND action="*admin*") | stats count by src_ip
🔗 References
- https://patchstack.com/database/vulnerability/church-admin/wordpress-church-admin-plugin-4-1-32-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/church-admin/wordpress-church-admin-plugin-4-1-32-cross-site-request-forgery-csrf-vulnerability?_s_id=cve