Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11227: CWE-285 Improper Authorization in givewp GiveWP – Donation Plugin and Fundraising Platform

0
Medium
VulnerabilityCVE-2025-11227cvecve-2025-11227cwe-285
Published: Sat Oct 04 2025 (10/04/2025, 02:24:35 UTC)
Source: CVE Database V5
Vendor/Project: givewp
Product: GiveWP – Donation Plugin and Fundraising Platform

Description

The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 4.10.0 via the 'registerGetForm', 'registerGetForms', 'registerGetCampaign' and 'registerGetCampaigns' functions due to a missing capability check. This makes it possible for unauthenticated attackers to extract data from private and draft donation forms, as well as archived campaigns.

AI-Powered Analysis

AILast updated: 10/11/2025, 08:42:09 UTC

Technical Analysis

CVE-2025-11227 is an improper authorization vulnerability (CWE-285) affecting the GiveWP – Donation Plugin and Fundraising Platform for WordPress, versions up to and including 4.10.0. The vulnerability arises because the plugin's API functions 'registerGetForm', 'registerGetForms', 'registerGetCampaign', and 'registerGetCampaigns' lack proper capability checks, allowing unauthenticated users to retrieve data from private and draft donation forms as well as archived campaigns. This missing authorization check means that any attacker can query these endpoints over the network without authentication or user interaction, exposing sensitive fundraising data that should be restricted. The exposed data could include donor information, campaign details, and other private fundraising metrics, potentially leading to privacy violations and reputational damage. The CVSS 3.1 score of 6.5 reflects a medium severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. While no exploits have been reported in the wild, the vulnerability presents a significant risk to organizations relying on GiveWP for managing donations and campaigns. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for interim mitigations. The vulnerability affects all versions up to 4.10.0, indicating a broad impact on users of the plugin. The improper authorization issue is a common security flaw that can be mitigated by implementing proper capability checks to ensure only authorized users can access sensitive API endpoints.

Potential Impact

For European organizations, the impact of CVE-2025-11227 can be significant, especially for nonprofits, charities, and fundraising entities that use the GiveWP plugin to manage donations and campaigns. Unauthorized exposure of private and draft donation forms and archived campaigns can lead to leakage of donor personal data, donation amounts, and campaign strategies, violating data protection regulations such as GDPR. This could result in legal penalties, loss of donor trust, and reputational harm. Additionally, exposure of campaign data might enable adversaries to disrupt fundraising efforts or conduct targeted phishing attacks against donors. Since the vulnerability requires no authentication and can be exploited remotely, the attack surface is broad, increasing the likelihood of exploitation if left unmitigated. The medium severity rating indicates moderate impact on confidentiality and integrity but no direct impact on availability. Organizations with large donor bases or high-profile campaigns are at greater risk of consequential damage.

Mitigation Recommendations

To mitigate CVE-2025-11227, European organizations should: 1) Monitor and restrict access to the affected API endpoints ('registerGetForm', 'registerGetForms', 'registerGetCampaign', 'registerGetCampaigns') using web application firewalls (WAFs) or reverse proxies to block unauthenticated requests. 2) Implement IP whitelisting or rate limiting on these endpoints to reduce exposure. 3) Regularly audit plugin usage and logs for suspicious access patterns indicating exploitation attempts. 4) Temporarily disable or restrict the GiveWP plugin if feasible until a patch is released. 5) Engage with the plugin vendor or community to obtain or apply security patches promptly once available. 6) Educate site administrators on the importance of plugin updates and secure configuration. 7) Consider alternative donation management solutions with stronger security controls if immediate patching is not possible. 8) Ensure compliance with GDPR by reviewing data exposure risks and notifying affected parties if a breach occurs. These steps go beyond generic advice by focusing on access control at the network and application layers and proactive monitoring.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-10-01T11:59:03.245Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e0877c11971642e85b3464

Added to database: 10/4/2025, 2:33:32 AM

Last enriched: 10/11/2025, 8:42:09 AM

Last updated: 11/22/2025, 3:22:30 PM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats