Cyber Posture

CVE-2025-32304

High

Published: 06 January 2026

Published
06 January 2026
Modified
23 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0011 28.6th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mojoomla WPCHURCH church-management allows PHP Local File Inclusion.This issue affects WPCHURCH: from n/a through <= 2.7.0.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Remediating the specific flaw in the WPCHURCH plugin's improper filename control for PHP include/require directly eliminates the local file inclusion vulnerability.

prevent

Validating user-supplied filenames before use in PHP include/require statements prevents path traversal and arbitrary local file inclusion attacks.

prevent

Configuring PHP settings such as open_basedir restricts the directories accessible via include/require, limiting the impact of local file inclusion even if input validation fails.

Security SummaryAI

CVE-2025-32304 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified under CWE-98 and commonly known as PHP Remote File Inclusion, that enables PHP Local File Inclusion in the Mojoomla WPCHURCH church-management WordPress plugin. This issue affects all versions of WPCHURCH from n/a through 2.7.0. The vulnerability carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact.

Unauthenticated remote attackers can exploit this vulnerability over the network without requiring user interaction, though exploitation demands high attack complexity. Successful attacks grant high-level impacts on confidentiality, integrity, and availability, potentially allowing attackers to include and execute local PHP files on the server.

The Patchstack advisory provides further details on this vulnerability, including mitigation guidance, at https://patchstack.com/database/Wordpress/Plugin/church-management/vulnerability/wordpress-wpchurch-plugin-2-7-0-local-file-inclusion-vulnerability?_s_id=cve.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

LFI in public-facing WordPress plugin directly enables remote code execution via malicious local file include (T1190); commonly abused to deploy/execute web shells (T1505.003).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References