CVE-2025-32303
Published: 07 January 2026
Summary
CVE-2025-32303 is a critical-severity SQL Injection (CWE-89) vulnerability. Its CVSS base score is 9.3 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 17.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 requires validating and sanitizing all information inputs, directly preventing blind SQL injection by neutralizing special elements in SQL commands as exploited in this CVE.
SI-2 mandates identifying, prioritizing, and remediating flaws like the SQL injection vulnerability in WPCHURCH versions <=2.7.0 through timely patching.
RA-5 requires vulnerability scanning that would identify the blind SQL injection vulnerability in the WPCHURCH plugin for subsequent remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing WordPress plugin directly enables T1190 exploitation for unauthenticated remote DB access and facilitates T1213.006 data collection from databases.
NVD Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mojoomla WPCHURCH church-management allows Blind SQL Injection.This issue affects WPCHURCH: from n/a through <= 2.7.0.
Deeper analysisAI
CVE-2025-32303 is an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability, classified as Blind SQL Injection, in the Mojoomla WPCHURCH church-management WordPress plugin. This issue affects WPCHURCH versions from n/a through <= 2.7.0.
Remote attackers require no privileges or user interaction to exploit this vulnerability over the network with low complexity. Successful exploitation enables a scope change with high confidentiality impact, allowing extraction of sensitive data from the database, while integrity and availability impacts are low.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/church-management/vulnerability/wordpress-wpchurch-2-7-0-sql-injection-vulnerability?_s_id=cve provides details on this vulnerability, including recommended mitigations for affected WordPress installations.
Details
- CWE(s)