CVE-2024-35637

4.4 MEDIUM

📋 TL;DR

This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in the Church Admin WordPress plugin. It allows attackers to make the vulnerable server send unauthorized requests to internal or external systems. WordPress sites using Church Admin versions up to 4.3.6 are affected.

💻 Affected Systems

Products:
  • Church Admin WordPress Plugin
Versions: n/a through 4.3.6
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Church Admin plugin enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, perform port scanning, or interact with cloud metadata services to gain further access.

🟠

Likely Case

Information disclosure from internal services, limited internal network reconnaissance, or abuse of the server as a proxy.

🟢

If Mitigated

Limited impact if network segmentation restricts internal access and external requests are filtered.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation likely requires some level of access to the WordPress site, but specific authentication requirements are not detailed in available references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.3.7 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/church-admin/wordpress-church-admin-plugin-4-3-6-server-side-request-forgery-ssrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Church Admin and click 'Update Now' if available. 4. Alternatively, download version 4.3.7+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable Church Admin Plugin

all

Temporarily deactivate the vulnerable plugin until patched.

wp plugin deactivate church-admin

Network Restriction

all

Use web application firewall or network controls to block outbound requests from the web server to internal networks.

🧯 If You Can't Patch

  • Disable the Church Admin plugin entirely.
  • Implement strict network egress filtering from the web server to prevent internal requests.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Church Admin version. If version is 4.3.6 or earlier, it's vulnerable.

Check Version:

wp plugin list --name=church-admin --field=version

Verify Fix Applied:

Confirm Church Admin plugin version is 4.3.7 or later in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from web server logs to internal IPs or unexpected domains.
  • Requests to cloud metadata endpoints (e.g., 169.254.169.254) from web server.

Network Indicators:

  • Web server making unexpected outbound connections to internal services or external URLs with unusual patterns.

SIEM Query:

source="web_server_logs" AND (url CONTAINS "internal_ip" OR url CONTAINS "metadata")

🔗 References

📤 Share & Export