CVE-2025-11228: CWE-862 Missing Authorization in givewp GiveWP – Donation Plugin and Fundraising Platform
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `registerAssociateFormsWithCampaign` function in all versions up to, and including, 4.10.0. This makes it possible for unauthenticated attackers to associate any donation forms with any campaign.
AI Analysis
Technical Summary
CVE-2025-11228 is a medium-severity vulnerability affecting the GiveWP – Donation Plugin and Fundraising Platform for WordPress, present in all versions up to and including 4.10.0. The vulnerability arises from a missing authorization check (CWE-862) in the function registerAssociateFormsWithCampaign. This function is responsible for associating donation forms with fundraising campaigns. Due to the lack of capability verification, unauthenticated attackers can exploit this flaw to associate arbitrary donation forms with any campaign without proper permissions. The vulnerability does not allow direct data disclosure or deletion but permits unauthorized modification of campaign-form associations, potentially enabling attackers to manipulate donation flows or misdirect funds. The CVSS 3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts integrity (I:L) but not confidentiality or availability. No known exploits are currently reported in the wild. The vulnerability affects all versions of the plugin up to 4.10.0, and no official patches or updates are linked yet. Given the plugin’s role in managing donations and fundraising campaigns, this vulnerability could be leveraged to disrupt fundraising activities, misattribute donations, or undermine donor trust if exploited.
Potential Impact
For European organizations, especially nonprofits, charities, and fundraising entities using WordPress with the GiveWP plugin, this vulnerability poses a risk of unauthorized manipulation of donation campaigns. Attackers could associate donation forms with incorrect campaigns, potentially diverting funds or causing confusion among donors. This could lead to financial losses, reputational damage, and erosion of donor confidence. Since the vulnerability does not require authentication or user interaction, it can be exploited remotely and easily, increasing the risk of automated or opportunistic attacks. Organizations relying on GiveWP for critical fundraising operations may experience disruption in their donation processes, impacting their ability to raise funds effectively. Additionally, regulatory compliance concerns such as GDPR could arise if donor data integrity is compromised or if financial mismanagement occurs due to exploitation of this flaw.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the GiveWP plugin and verify the version in use. Until an official patch is released, organizations should consider the following specific mitigations: 1) Restrict access to the WordPress REST API endpoints related to GiveWP by implementing IP whitelisting or authentication proxies to prevent unauthenticated requests. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the registerAssociateFormsWithCampaign function or related API calls. 3) Monitor logs for unusual activity involving donation form associations or campaign modifications. 4) Temporarily disable or deactivate the GiveWP plugin if feasible, especially if fundraising operations can be paused or migrated. 5) Engage with the plugin vendor or community to track patch releases and apply updates promptly once available. 6) Educate internal teams about the risk and encourage vigilance for any anomalies in donation processing. These targeted steps go beyond generic advice by focusing on access control and monitoring specific to the vulnerable function and plugin behavior.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Belgium, Italy, Spain
CVE-2025-11228: CWE-862 Missing Authorization in givewp GiveWP – Donation Plugin and Fundraising Platform
Description
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `registerAssociateFormsWithCampaign` function in all versions up to, and including, 4.10.0. This makes it possible for unauthenticated attackers to associate any donation forms with any campaign.
AI-Powered Analysis
Technical Analysis
CVE-2025-11228 is a medium-severity vulnerability affecting the GiveWP – Donation Plugin and Fundraising Platform for WordPress, present in all versions up to and including 4.10.0. The vulnerability arises from a missing authorization check (CWE-862) in the function registerAssociateFormsWithCampaign. This function is responsible for associating donation forms with fundraising campaigns. Due to the lack of capability verification, unauthenticated attackers can exploit this flaw to associate arbitrary donation forms with any campaign without proper permissions. The vulnerability does not allow direct data disclosure or deletion but permits unauthorized modification of campaign-form associations, potentially enabling attackers to manipulate donation flows or misdirect funds. The CVSS 3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts integrity (I:L) but not confidentiality or availability. No known exploits are currently reported in the wild. The vulnerability affects all versions of the plugin up to 4.10.0, and no official patches or updates are linked yet. Given the plugin’s role in managing donations and fundraising campaigns, this vulnerability could be leveraged to disrupt fundraising activities, misattribute donations, or undermine donor trust if exploited.
Potential Impact
For European organizations, especially nonprofits, charities, and fundraising entities using WordPress with the GiveWP plugin, this vulnerability poses a risk of unauthorized manipulation of donation campaigns. Attackers could associate donation forms with incorrect campaigns, potentially diverting funds or causing confusion among donors. This could lead to financial losses, reputational damage, and erosion of donor confidence. Since the vulnerability does not require authentication or user interaction, it can be exploited remotely and easily, increasing the risk of automated or opportunistic attacks. Organizations relying on GiveWP for critical fundraising operations may experience disruption in their donation processes, impacting their ability to raise funds effectively. Additionally, regulatory compliance concerns such as GDPR could arise if donor data integrity is compromised or if financial mismanagement occurs due to exploitation of this flaw.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the GiveWP plugin and verify the version in use. Until an official patch is released, organizations should consider the following specific mitigations: 1) Restrict access to the WordPress REST API endpoints related to GiveWP by implementing IP whitelisting or authentication proxies to prevent unauthenticated requests. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the registerAssociateFormsWithCampaign function or related API calls. 3) Monitor logs for unusual activity involving donation form associations or campaign modifications. 4) Temporarily disable or deactivate the GiveWP plugin if feasible, especially if fundraising operations can be paused or migrated. 5) Engage with the plugin vendor or community to track patch releases and apply updates promptly once available. 6) Educate internal teams about the risk and encourage vigilance for any anomalies in donation processing. These targeted steps go beyond generic advice by focusing on access control and monitoring specific to the vulnerable function and plugin behavior.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-01T12:00:09.679Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e0877c11971642e85b346c
Added to database: 10/4/2025, 2:33:32 AM
Last enriched: 10/4/2025, 2:49:22 AM
Last updated: 10/7/2025, 10:35:51 AM
Views: 62
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11387: Stack-based Buffer Overflow in Tenda AC15
HighCVE-2025-11386: Stack-based Buffer Overflow in Tenda AC15
HighCVE-2025-11385: Buffer Overflow in Tenda AC20
HighCVE-2025-11360: Cross Site Scripting in jakowenko double-take
MediumThe CVE-2025-59489 vulnerability in Unity, and how to fix it in games | Kaspersky official blog
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.