CVE-2025-31643
Incorrect Privilege Assignment in WPCHURCH Allows Privilege Escalation
Publication date: 2026-01-07
Last updated on: 2026-04-28
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| dasinfomedia | wpchurch | to 2.7.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-266 | A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-31643 is a high-priority privilege escalation vulnerability in the WordPress WPCHURCH plugin (versions up to 2.7.0). It allows a malicious user with a low-privileged account, such as a subscriber, to escalate their privileges to a higher level, potentially gaining full control over the affected website. This vulnerability is classified under OWASP Top 10 A3: Injection and has a CVSS score of 8.8, indicating it is highly dangerous and likely to be exploited. [1]
How can this vulnerability impact me? :
This vulnerability can allow an attacker with minimal access (subscriber-level) to escalate their privileges and gain full control over your WordPress website using the WPCHURCH plugin. This could lead to unauthorized access, data manipulation, site defacement, or complete takeover of the website, severely compromising its security and integrity. [1]
What immediate steps should I take to mitigate this vulnerability?
Users should immediately apply the mitigation rule issued by Patchstack to block attacks exploiting this vulnerability until an official patch is released. This mitigation helps protect WordPress sites running the WPCHURCH plugin versions up to 2.7.0 from privilege escalation attacks. Implementing automated protection solutions from Patchstack is also recommended to secure the site. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
There is no specific information provided about detection commands or methods to identify this vulnerability on your network or system. However, Patchstack has issued a mitigation rule to block attacks exploiting this vulnerability until an official patch is released. It is recommended to apply this mitigation rule immediately to protect your site. No explicit detection commands or network indicators are mentioned in the provided resources. [1]