Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11228: CWE-862 Missing Authorization in givewp GiveWP – Donation Plugin and Fundraising Platform

0
Medium
VulnerabilityCVE-2025-11228cvecve-2025-11228cwe-862
Published: Sat Oct 04 2025 (10/04/2025, 02:24:37 UTC)
Source: CVE Database V5
Vendor/Project: givewp
Product: GiveWP – Donation Plugin and Fundraising Platform

Description

The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `registerAssociateFormsWithCampaign` function in all versions up to, and including, 4.10.0. This makes it possible for unauthenticated attackers to associate any donation forms with any campaign.

AI-Powered Analysis

AILast updated: 10/11/2025, 08:42:22 UTC

Technical Analysis

CVE-2025-11228 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the GiveWP Donation Plugin and Fundraising Platform for WordPress. The vulnerability arises from the lack of a capability check in the function `registerAssociateFormsWithCampaign`, which is responsible for associating donation forms with fundraising campaigns. Because this function does not verify the privileges of the caller, unauthenticated attackers can invoke it to link any donation form to any campaign arbitrarily. This unauthorized modification can lead to manipulation of donation flows, potentially redirecting funds or confusing donors. The vulnerability affects all versions up to and including 4.10.0. The CVSS v3.1 base score is 5.3, reflecting medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), integrity impact (I:L), and no availability impact (A:N). There are currently no known exploits in the wild, and no patches have been linked yet. The vulnerability was publicly disclosed on October 4, 2025, by Wordfence. The primary risk is unauthorized integrity modification of donation data, which could undermine trust in fundraising campaigns and cause reputational damage to organizations relying on GiveWP for donations.

Potential Impact

For European organizations, especially nonprofits and charities using WordPress with the GiveWP plugin, this vulnerability poses a risk of unauthorized manipulation of donation campaigns. Attackers could associate donation forms with incorrect campaigns, potentially diverting funds or causing donor confusion. While the vulnerability does not expose sensitive donor information or disrupt service availability, the integrity compromise could damage organizational reputation and donor trust, which are critical for fundraising success. Given the widespread use of WordPress and the popularity of GiveWP among European nonprofits, the impact could be significant if exploited at scale. Additionally, manipulation of donation campaigns could have regulatory implications under European data protection and financial transparency laws, such as GDPR and anti-fraud regulations. Organizations relying on GiveWP should consider the potential financial and reputational consequences of this vulnerability.

Mitigation Recommendations

Since no official patch is currently available, European organizations should implement the following mitigations: 1) Restrict access to the vulnerable function by applying custom code or web application firewall (WAF) rules to block unauthenticated requests targeting `registerAssociateFormsWithCampaign`. 2) Monitor logs and audit trails for unusual or unauthorized changes to donation form associations. 3) Temporarily disable or limit the use of the affected functionality if feasible until a patch is released. 4) Ensure WordPress core and all plugins, including GiveWP, are kept up to date once a security update addressing this vulnerability is published. 5) Educate fundraising and IT teams about the risk and signs of exploitation to enable rapid detection and response. 6) Consider implementing multi-factor authentication and role-based access controls for administrative functions related to donation management to reduce risk from other attack vectors. 7) Engage with the GiveWP vendor or community for updates and recommended fixes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-10-01T12:00:09.679Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e0877c11971642e85b346c

Added to database: 10/4/2025, 2:33:32 AM

Last enriched: 10/11/2025, 8:42:22 AM

Last updated: 11/20/2025, 7:21:36 AM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats