CVE-2025-31643
Published: 07 January 2026
Summary
CVE-2025-31643 is a high-severity Incorrect Privilege Assignment (CWE-266) vulnerability. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 17.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-6 (Least Privilege) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Remediates the specific flaw in the WPCHURCH plugin causing incorrect privilege assignment and privilege escalation.
Enforces least privilege to directly counter privilege escalation by limiting access to only essential permissions.
Manages account privileges to prevent incorrect assignments that enable low-privileged users to escalate access.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct privilege escalation via incorrect privilege assignment in authenticated WordPress plugin context maps to exploitation for privilege escalation.
NVD Description
Incorrect Privilege Assignment vulnerability in Dasinfomedia WPCHURCH church-management allows Privilege Escalation.This issue affects WPCHURCH: from n/a through <= 2.7.0.
Deeper analysisAI
CVE-2025-31643 is an Incorrect Privilege Assignment vulnerability (CWE-266) in the Dasinfomedia WPCHURCH church-management WordPress plugin, which allows privilege escalation. The issue affects WPCHURCH versions from n/a through 2.7.0 and was published on 2026-01-07. It has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
An authenticated attacker with low privileges can exploit this vulnerability remotely over the network with low attack complexity and no user interaction required. Successful exploitation enables privilege escalation, resulting in high impacts to confidentiality, integrity, and availability.
The Patchstack advisory provides further details on this vulnerability, including mitigation recommendations, at https://patchstack.com/database/Wordpress/Plugin/church-management/vulnerability/wordpress-wpchurch-2-7-0-privilege-escalation-vulnerability?_s_id=cve.
Details
- CWE(s)