CVE-2025-32304
Published: 06 January 2026
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mojoomla WPCHURCH church-management allows PHP Local File Inclusion.This issue affects WPCHURCH: from n/a through <= 2.7.0.
Mitigating Controls (NIST 800-53 r5)AI
Remediating the specific flaw in the WPCHURCH plugin's improper filename control for PHP include/require directly eliminates the local file inclusion vulnerability.
Validating user-supplied filenames before use in PHP include/require statements prevents path traversal and arbitrary local file inclusion attacks.
Configuring PHP settings such as open_basedir restricts the directories accessible via include/require, limiting the impact of local file inclusion even if input validation fails.
Security SummaryAI
CVE-2025-32304 is an Improper Control of Filename for Include/Require Statement in PHP Program vulnerability, classified under CWE-98 and commonly known as PHP Remote File Inclusion, that enables PHP Local File Inclusion in the Mojoomla WPCHURCH church-management WordPress plugin. This issue affects all versions of WPCHURCH from n/a through 2.7.0. The vulnerability carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact.
Unauthenticated remote attackers can exploit this vulnerability over the network without requiring user interaction, though exploitation demands high attack complexity. Successful attacks grant high-level impacts on confidentiality, integrity, and availability, potentially allowing attackers to include and execute local PHP files on the server.
The Patchstack advisory provides further details on this vulnerability, including mitigation guidance, at https://patchstack.com/database/Wordpress/Plugin/church-management/vulnerability/wordpress-wpchurch-plugin-2-7-0-local-file-inclusion-vulnerability?_s_id=cve.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
LFI in public-facing WordPress plugin directly enables remote code execution via malicious local file include (T1190); commonly abused to deploy/execute web shells (T1505.003).