CVE-2025-31642
Unknown Unknown - Not Provided
Reflected XSS in WPCHURCH ≀ 2.7.0 Enables Script Injection

Publication date: 2026-01-07

Last updated on: 2026-04-28

Assigner: Patchstack

Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Dasinfomedia WPCHURCH allows Reflected XSS.This issue affects WPCHURCH: from n/a through 2.7.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-07
Last Modified
2026-04-28
Generated
2026-05-07
AI Q&A
2026-01-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
dasinfomedia wpchurch to 2.7.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-31642 is a medium severity Cross Site Scripting (XSS) vulnerability in the WordPress WPCHURCH plugin up to version 2.7.0. It allows an attacker to inject malicious scripts, such as redirects or advertisements, into a website. These scripts execute when visitors access the site. The vulnerability falls under the OWASP Top 10 category A3: Injection and requires user interaction, like clicking a malicious link or visiting a crafted page, although the initial attack can be started by an unauthenticated user. [1]


How can this vulnerability impact me? :

This vulnerability can lead to attackers executing malicious scripts on your website, potentially redirecting visitors, displaying unwanted advertisements, or stealing sensitive information. It can compromise the integrity and trustworthiness of your site, affect user experience, and possibly lead to further attacks. Since the vulnerability allows reflected XSS, attackers can trick users into performing actions or revealing data unintentionally. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves monitoring for attempts to inject malicious scripts via reflected input in the WPCHURCH plugin. While no specific commands are provided, users can look for unusual HTTP requests containing suspicious script payloads or parameters that reflect input back in responses. Using web application firewalls (WAF) with rules targeting this vulnerability or scanning tools that detect reflected XSS in WPCHURCH plugin versions up to 2.7.0 can help identify exploitation attempts. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include applying the mitigation rule issued by Patchstack to block attacks targeting this vulnerability until an official patch is released. Users should promptly implement this automated mitigation solution provided by Patchstack to protect affected WordPress installations running WPCHURCH plugin versions up to 2.7.0. Additionally, monitoring and restricting user input that could be reflected in web pages can reduce risk. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart