CVE-2025-39553

4.3 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the Church Admin WordPress plugin that allows unauthorized users to access sensitive data. The vulnerability affects all versions up to and including 5.0.9. WordPress sites using the vulnerable plugin are at risk of data exposure.

💻 Affected Systems

Products:
  • Church Admin WordPress Plugin
Versions: n/a through 5.0.9
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with Church Admin plugin versions ≤5.0.9 are vulnerable by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthenticated attackers could access sensitive church member data, financial records, or administrative information, leading to privacy violations and potential identity theft.

🟠

Likely Case

Low-privileged users or visitors could access data they shouldn't have permission to view, such as member directories, event registrations, or donation records.

🟢

If Mitigated

With proper access controls and network segmentation, impact would be limited to unauthorized data viewing within authorized user groups.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of WordPress plugin structure and API endpoints, but no authentication is needed for the vulnerable endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 5.0.9

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/church-admin/vulnerability/wordpress-church-admin-plugin-5-0-9-sensitive-data-exposure-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find Church Admin plugin
4. Click 'Update Now' if update available
5. If no update available, deactivate and remove plugin
6. Install latest version from WordPress repository

🔧 Temporary Workarounds

Temporary Access Restriction

all

Restrict access to Church Admin functionality using WordPress roles or .htaccess rules

# Add to .htaccess for specific Church Admin paths
<FilesMatch "church-admin.*">
Require all denied
</FilesMatch>

🧯 If You Can't Patch

  • Deactivate and remove the Church Admin plugin immediately
  • Implement network-level restrictions to block access to Church Admin endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Church Admin version. If version ≤5.0.9, you are vulnerable.

Check Version:

wp plugin list --name=church-admin --field=version

Verify Fix Applied:

After updating, verify Church Admin plugin version is >5.0.9 in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to Church Admin endpoints
  • Unauthorized users accessing /wp-content/plugins/church-admin/ paths

Network Indicators:

  • HTTP requests to Church Admin API endpoints from unauthorized IPs
  • Unusual data export patterns

SIEM Query:

source="wordpress.log" AND ("church-admin" OR "church_admin") AND (status=200 OR status=302) AND NOT user_role IN ("administrator","editor")

🔗 References

📤 Share & Export