CVE-2024-37440
📋 TL;DR
This CVE describes a missing authorization vulnerability in the Church Admin WordPress plugin that allows attackers to bypass access controls and perform unauthorized actions. It affects all versions up to and including 4.4.4. WordPress sites using vulnerable versions of this plugin are at risk.
💻 Affected Systems
- WordPress Church Admin Plugin
📦 What is this software?
Church Admin by Church Admin Project
⚠️ Risk & Real-World Impact
Worst Case
Attackers could modify church administration data, access sensitive member information, or disrupt church operations by exploiting the broken access control.
Likely Case
Unauthorized users could access administrative functions they shouldn't have permission to use, potentially viewing or modifying church data.
If Mitigated
With proper network segmentation and least privilege access, impact would be limited to the specific WordPress instance.
🎯 Exploit Status
Exploitation requires some level of access to the WordPress site, but the vulnerability makes authorization checks insufficient.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 4.4.4
Vendor Advisory: https://patchstack.com/database/vulnerability/church-admin/wordpress-church-admin-plugin-4-4-4-broken-access-control-vulnerability?_s_id=cve
Restart Required: No
Instructions:
1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find Church Admin plugin
4. Click 'Update Now' if update is available
5. If no update appears, manually download latest version from WordPress repository
6. Deactivate old version, upload new version, activate
🔧 Temporary Workarounds
Temporary Plugin Deactivation
allDisable the vulnerable plugin until patched
wp plugin deactivate church-admin
Access Restriction via .htaccess
linuxRestrict access to plugin directories
Order Deny,Allow
Deny from all
🧯 If You Can't Patch
- Implement strict network segmentation to isolate the WordPress instance
- Apply principle of least privilege to all user accounts and monitor for unauthorized access attempts
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Installed Plugins → Church Admin version
Check Version:
wp plugin get church-admin --field=version
Verify Fix Applied:
Verify Church Admin plugin version is greater than 4.4.4
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to Church Admin functions
- Unexpected user role changes or privilege escalations
Network Indicators:
- Unusual API calls to Church Admin endpoints from unauthorized IPs
SIEM Query:
source="wordpress.log" AND "church-admin" AND ("unauthorized" OR "permission denied")