CVE-2025-11227: CWE-285 Improper Authorization in givewp GiveWP – Donation Plugin and Fundraising Platform
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 4.10.0 via the 'registerGetForm', 'registerGetForms', 'registerGetCampaign' and 'registerGetCampaigns' functions due to a missing capability check. This makes it possible for unauthenticated attackers to extract data from private and draft donation forms, as well as archived campaigns.
AI Analysis
Technical Summary
CVE-2025-11227 is an improper authorization vulnerability (CWE-285) affecting the GiveWP – Donation Plugin and Fundraising Platform for WordPress, versions up to and including 4.10.0. The vulnerability arises because the plugin's API functions 'registerGetForm', 'registerGetForms', 'registerGetCampaign', and 'registerGetCampaigns' lack proper capability checks, allowing unauthenticated users to retrieve data from private and draft donation forms as well as archived campaigns. This missing authorization check means that any attacker can query these endpoints over the network without authentication or user interaction, exposing sensitive fundraising data that should be restricted. The exposed data could include donor information, campaign details, and other private fundraising metrics, potentially leading to privacy violations and reputational damage. The CVSS 3.1 score of 6.5 reflects a medium severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. While no exploits have been reported in the wild, the vulnerability presents a significant risk to organizations relying on GiveWP for managing donations and campaigns. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for interim mitigations. The vulnerability affects all versions up to 4.10.0, indicating a broad impact on users of the plugin. The improper authorization issue is a common security flaw that can be mitigated by implementing proper capability checks to ensure only authorized users can access sensitive API endpoints.
Potential Impact
For European organizations, the impact of CVE-2025-11227 can be significant, especially for nonprofits, charities, and fundraising entities that use the GiveWP plugin to manage donations and campaigns. Unauthorized exposure of private and draft donation forms and archived campaigns can lead to leakage of donor personal data, donation amounts, and campaign strategies, violating data protection regulations such as GDPR. This could result in legal penalties, loss of donor trust, and reputational harm. Additionally, exposure of campaign data might enable adversaries to disrupt fundraising efforts or conduct targeted phishing attacks against donors. Since the vulnerability requires no authentication and can be exploited remotely, the attack surface is broad, increasing the likelihood of exploitation if left unmitigated. The medium severity rating indicates moderate impact on confidentiality and integrity but no direct impact on availability. Organizations with large donor bases or high-profile campaigns are at greater risk of consequential damage.
Mitigation Recommendations
To mitigate CVE-2025-11227, European organizations should: 1) Monitor and restrict access to the affected API endpoints ('registerGetForm', 'registerGetForms', 'registerGetCampaign', 'registerGetCampaigns') using web application firewalls (WAFs) or reverse proxies to block unauthenticated requests. 2) Implement IP whitelisting or rate limiting on these endpoints to reduce exposure. 3) Regularly audit plugin usage and logs for suspicious access patterns indicating exploitation attempts. 4) Temporarily disable or restrict the GiveWP plugin if feasible until a patch is released. 5) Engage with the plugin vendor or community to obtain or apply security patches promptly once available. 6) Educate site administrators on the importance of plugin updates and secure configuration. 7) Consider alternative donation management solutions with stronger security controls if immediate patching is not possible. 8) Ensure compliance with GDPR by reviewing data exposure risks and notifying affected parties if a breach occurs. These steps go beyond generic advice by focusing on access control at the network and application layers and proactive monitoring.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Belgium, Italy, Spain
CVE-2025-11227: CWE-285 Improper Authorization in givewp GiveWP – Donation Plugin and Fundraising Platform
Description
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 4.10.0 via the 'registerGetForm', 'registerGetForms', 'registerGetCampaign' and 'registerGetCampaigns' functions due to a missing capability check. This makes it possible for unauthenticated attackers to extract data from private and draft donation forms, as well as archived campaigns.
AI-Powered Analysis
Technical Analysis
CVE-2025-11227 is an improper authorization vulnerability (CWE-285) affecting the GiveWP – Donation Plugin and Fundraising Platform for WordPress, versions up to and including 4.10.0. The vulnerability arises because the plugin's API functions 'registerGetForm', 'registerGetForms', 'registerGetCampaign', and 'registerGetCampaigns' lack proper capability checks, allowing unauthenticated users to retrieve data from private and draft donation forms as well as archived campaigns. This missing authorization check means that any attacker can query these endpoints over the network without authentication or user interaction, exposing sensitive fundraising data that should be restricted. The exposed data could include donor information, campaign details, and other private fundraising metrics, potentially leading to privacy violations and reputational damage. The CVSS 3.1 score of 6.5 reflects a medium severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. While no exploits have been reported in the wild, the vulnerability presents a significant risk to organizations relying on GiveWP for managing donations and campaigns. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for interim mitigations. The vulnerability affects all versions up to 4.10.0, indicating a broad impact on users of the plugin. The improper authorization issue is a common security flaw that can be mitigated by implementing proper capability checks to ensure only authorized users can access sensitive API endpoints.
Potential Impact
For European organizations, the impact of CVE-2025-11227 can be significant, especially for nonprofits, charities, and fundraising entities that use the GiveWP plugin to manage donations and campaigns. Unauthorized exposure of private and draft donation forms and archived campaigns can lead to leakage of donor personal data, donation amounts, and campaign strategies, violating data protection regulations such as GDPR. This could result in legal penalties, loss of donor trust, and reputational harm. Additionally, exposure of campaign data might enable adversaries to disrupt fundraising efforts or conduct targeted phishing attacks against donors. Since the vulnerability requires no authentication and can be exploited remotely, the attack surface is broad, increasing the likelihood of exploitation if left unmitigated. The medium severity rating indicates moderate impact on confidentiality and integrity but no direct impact on availability. Organizations with large donor bases or high-profile campaigns are at greater risk of consequential damage.
Mitigation Recommendations
To mitigate CVE-2025-11227, European organizations should: 1) Monitor and restrict access to the affected API endpoints ('registerGetForm', 'registerGetForms', 'registerGetCampaign', 'registerGetCampaigns') using web application firewalls (WAFs) or reverse proxies to block unauthenticated requests. 2) Implement IP whitelisting or rate limiting on these endpoints to reduce exposure. 3) Regularly audit plugin usage and logs for suspicious access patterns indicating exploitation attempts. 4) Temporarily disable or restrict the GiveWP plugin if feasible until a patch is released. 5) Engage with the plugin vendor or community to obtain or apply security patches promptly once available. 6) Educate site administrators on the importance of plugin updates and secure configuration. 7) Consider alternative donation management solutions with stronger security controls if immediate patching is not possible. 8) Ensure compliance with GDPR by reviewing data exposure risks and notifying affected parties if a breach occurs. These steps go beyond generic advice by focusing on access control at the network and application layers and proactive monitoring.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-01T11:59:03.245Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e0877c11971642e85b3464
Added to database: 10/4/2025, 2:33:32 AM
Last enriched: 10/11/2025, 8:42:09 AM
Last updated: 11/22/2025, 3:22:30 PM
Views: 71
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighCVE-2024-12856: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Four-Faith F3x24
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.