Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mojoomla WPCHURCH allows PHP Local File Inclusion.This issue affects WPCHURCH: from n/a through 2.7.0.
Published: 2026-01-06
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The WPCHURCH plugin includes a PHP include/require statement that does not properly sanitize the filename supplied by a user. This flaw, classified as CWE-98, allows an attacker to cause the server to include arbitrary local files. If the included file contains PHP code, the attacker may run arbitrary code on the host, compromising confidentiality, integrity, and availability of the website and potentially the underlying server.

Affected Systems

The vulnerability affects the Mojoomla WPCHURCH plugin for WordPress up to and including version 2.7.0. Any site running this plugin from its initial release through 2.7.0 is susceptible and needs to be assessed for exposure.

Risk and Exploitability

The CVSS score of 8.1 indicates high severity. The EPSS score of less than 1% suggests that, as of the latest data, exploitation is currently uncommon, and the vulnerability has not been listed in CISA’s KEV catalog. However, the flaw is externally exploitable via a crafted HTTP request that supplies a malicious file path to the plugin. An attacker with this ability can read arbitrary files or execute code, making the risk significant for exposed WordPress sites.

Generated by OpenCVE AI on April 30, 2026 at 14:19 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the WPCHURCH plugin to a release newer than 2.7.0 where the LFI issue is fixed
  • If an upgrade is not possible, immediately disable or uninstall the plugin to eliminate the vulnerable code path
  • Apply strict file permission settings to the web root and use a web application firewall to block LFI attempts

Generated by OpenCVE AI on April 30, 2026 at 14:19 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 19:45:00 +0000


Tue, 28 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mojoomla WPCHURCH church-management allows PHP Local File Inclusion.This issue affects WPCHURCH: from n/a through <= 2.7.0. Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mojoomla WPCHURCH allows PHP Local File Inclusion.This issue affects WPCHURCH: from n/a through 2.7.0.
References

Thu, 23 Apr 2026 15:30:00 +0000


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mojoomla WPCHURCH allows PHP Local File Inclusion.This issue affects WPCHURCH: from n/a through 2.7.0. Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mojoomla WPCHURCH church-management allows PHP Local File Inclusion.This issue affects WPCHURCH: from n/a through <= 2.7.0.
References

Wed, 07 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 06 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 06 Jan 2026 17:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mojoomla WPCHURCH allows PHP Local File Inclusion.This issue affects WPCHURCH: from n/a through 2.7.0.
Title WordPress WPCHURCH plugin <= 2.7.0 - Local File Inclusion vulnerability
Weaknesses CWE-98
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:21.656Z

Reserved: 2025-04-04T10:02:55.220Z

Link: CVE-2025-32304

cve-icon Vulnrichment

Updated: 2026-01-06T18:27:27.352Z

cve-icon NVD

Status : Deferred

Published: 2026-01-06T18:15:42.553

Modified: 2026-04-28T19:31:37.233

Link: CVE-2025-32304

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T14:30:06Z

Weaknesses