Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11228: CWE-862 Missing Authorization in givewp GiveWP – Donation Plugin and Fundraising Platform

0
Medium
VulnerabilityCVE-2025-11228cvecve-2025-11228cwe-862
Published: Sat Oct 04 2025 (10/04/2025, 02:24:37 UTC)
Source: CVE Database V5
Vendor/Project: givewp
Product: GiveWP – Donation Plugin and Fundraising Platform

Description

The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `registerAssociateFormsWithCampaign` function in all versions up to, and including, 4.10.0. This makes it possible for unauthenticated attackers to associate any donation forms with any campaign.

AI-Powered Analysis

AILast updated: 10/04/2025, 02:49:22 UTC

Technical Analysis

CVE-2025-11228 is a medium-severity vulnerability affecting the GiveWP – Donation Plugin and Fundraising Platform for WordPress, present in all versions up to and including 4.10.0. The vulnerability arises from a missing authorization check (CWE-862) in the function registerAssociateFormsWithCampaign. This function is responsible for associating donation forms with fundraising campaigns. Due to the lack of capability verification, unauthenticated attackers can exploit this flaw to associate arbitrary donation forms with any campaign without proper permissions. The vulnerability does not allow direct data disclosure or deletion but permits unauthorized modification of campaign-form associations, potentially enabling attackers to manipulate donation flows or misdirect funds. The CVSS 3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts integrity (I:L) but not confidentiality or availability. No known exploits are currently reported in the wild. The vulnerability affects all versions of the plugin up to 4.10.0, and no official patches or updates are linked yet. Given the plugin’s role in managing donations and fundraising campaigns, this vulnerability could be leveraged to disrupt fundraising activities, misattribute donations, or undermine donor trust if exploited.

Potential Impact

For European organizations, especially nonprofits, charities, and fundraising entities using WordPress with the GiveWP plugin, this vulnerability poses a risk of unauthorized manipulation of donation campaigns. Attackers could associate donation forms with incorrect campaigns, potentially diverting funds or causing confusion among donors. This could lead to financial losses, reputational damage, and erosion of donor confidence. Since the vulnerability does not require authentication or user interaction, it can be exploited remotely and easily, increasing the risk of automated or opportunistic attacks. Organizations relying on GiveWP for critical fundraising operations may experience disruption in their donation processes, impacting their ability to raise funds effectively. Additionally, regulatory compliance concerns such as GDPR could arise if donor data integrity is compromised or if financial mismanagement occurs due to exploitation of this flaw.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the GiveWP plugin and verify the version in use. Until an official patch is released, organizations should consider the following specific mitigations: 1) Restrict access to the WordPress REST API endpoints related to GiveWP by implementing IP whitelisting or authentication proxies to prevent unauthenticated requests. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the registerAssociateFormsWithCampaign function or related API calls. 3) Monitor logs for unusual activity involving donation form associations or campaign modifications. 4) Temporarily disable or deactivate the GiveWP plugin if feasible, especially if fundraising operations can be paused or migrated. 5) Engage with the plugin vendor or community to track patch releases and apply updates promptly once available. 6) Educate internal teams about the risk and encourage vigilance for any anomalies in donation processing. These targeted steps go beyond generic advice by focusing on access control and monitoring specific to the vulnerable function and plugin behavior.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-10-01T12:00:09.679Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e0877c11971642e85b346c

Added to database: 10/4/2025, 2:33:32 AM

Last enriched: 10/4/2025, 2:49:22 AM

Last updated: 10/7/2025, 10:35:51 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats