Sammy Forgit has discovered a vulnerability in the church_admin plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.
Input passed via the GET parameters to wp-content/plugins/church-admin/includes/validate.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The vulnerability is confirmed in version 0.33.4.5. Other versions may also be affected.
Solution: Update to version 0.4.3.
Provided and/or discovered by: Sammy Forgit.
Original Advisory: OpenSysCom:
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com
Subject: Wordpress church_admin Plugin GET Cross-Site Scripting Vulnerability
Score: 0 Posts: 2 User Since: 8th Jul 2012 System Score: N/A Location: UK Last edited on 8th Jul, 2012 08:45
That file just contained print_r($_GET); and was used in initial testing - no danger to anyone! No cross scripting vulnerability either - it didn't do anything.
It was not called from anywhere in the plugin and has now been removed from svn wordpress.org repository