CVE-2025-11228: CWE-862 Missing Authorization in givewp GiveWP – Donation Plugin and Fundraising Platform
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `registerAssociateFormsWithCampaign` function in all versions up to, and including, 4.10.0. This makes it possible for unauthenticated attackers to associate any donation forms with any campaign.
AI Analysis
Technical Summary
CVE-2025-11228 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the GiveWP Donation Plugin and Fundraising Platform for WordPress. The vulnerability arises from the lack of a capability check in the function `registerAssociateFormsWithCampaign`, which is responsible for associating donation forms with fundraising campaigns. Because this function does not verify the privileges of the caller, unauthenticated attackers can invoke it to link any donation form to any campaign arbitrarily. This unauthorized modification can lead to manipulation of donation flows, potentially redirecting funds or confusing donors. The vulnerability affects all versions up to and including 4.10.0. The CVSS v3.1 base score is 5.3, reflecting medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), integrity impact (I:L), and no availability impact (A:N). There are currently no known exploits in the wild, and no patches have been linked yet. The vulnerability was publicly disclosed on October 4, 2025, by Wordfence. The primary risk is unauthorized integrity modification of donation data, which could undermine trust in fundraising campaigns and cause reputational damage to organizations relying on GiveWP for donations.
Potential Impact
For European organizations, especially nonprofits and charities using WordPress with the GiveWP plugin, this vulnerability poses a risk of unauthorized manipulation of donation campaigns. Attackers could associate donation forms with incorrect campaigns, potentially diverting funds or causing donor confusion. While the vulnerability does not expose sensitive donor information or disrupt service availability, the integrity compromise could damage organizational reputation and donor trust, which are critical for fundraising success. Given the widespread use of WordPress and the popularity of GiveWP among European nonprofits, the impact could be significant if exploited at scale. Additionally, manipulation of donation campaigns could have regulatory implications under European data protection and financial transparency laws, such as GDPR and anti-fraud regulations. Organizations relying on GiveWP should consider the potential financial and reputational consequences of this vulnerability.
Mitigation Recommendations
Since no official patch is currently available, European organizations should implement the following mitigations: 1) Restrict access to the vulnerable function by applying custom code or web application firewall (WAF) rules to block unauthenticated requests targeting `registerAssociateFormsWithCampaign`. 2) Monitor logs and audit trails for unusual or unauthorized changes to donation form associations. 3) Temporarily disable or limit the use of the affected functionality if feasible until a patch is released. 4) Ensure WordPress core and all plugins, including GiveWP, are kept up to date once a security update addressing this vulnerability is published. 5) Educate fundraising and IT teams about the risk and signs of exploitation to enable rapid detection and response. 6) Consider implementing multi-factor authentication and role-based access controls for administrative functions related to donation management to reduce risk from other attack vectors. 7) Engage with the GiveWP vendor or community for updates and recommended fixes.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Belgium, Italy, Spain
CVE-2025-11228: CWE-862 Missing Authorization in givewp GiveWP – Donation Plugin and Fundraising Platform
Description
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `registerAssociateFormsWithCampaign` function in all versions up to, and including, 4.10.0. This makes it possible for unauthenticated attackers to associate any donation forms with any campaign.
AI-Powered Analysis
Technical Analysis
CVE-2025-11228 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the GiveWP Donation Plugin and Fundraising Platform for WordPress. The vulnerability arises from the lack of a capability check in the function `registerAssociateFormsWithCampaign`, which is responsible for associating donation forms with fundraising campaigns. Because this function does not verify the privileges of the caller, unauthenticated attackers can invoke it to link any donation form to any campaign arbitrarily. This unauthorized modification can lead to manipulation of donation flows, potentially redirecting funds or confusing donors. The vulnerability affects all versions up to and including 4.10.0. The CVSS v3.1 base score is 5.3, reflecting medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), integrity impact (I:L), and no availability impact (A:N). There are currently no known exploits in the wild, and no patches have been linked yet. The vulnerability was publicly disclosed on October 4, 2025, by Wordfence. The primary risk is unauthorized integrity modification of donation data, which could undermine trust in fundraising campaigns and cause reputational damage to organizations relying on GiveWP for donations.
Potential Impact
For European organizations, especially nonprofits and charities using WordPress with the GiveWP plugin, this vulnerability poses a risk of unauthorized manipulation of donation campaigns. Attackers could associate donation forms with incorrect campaigns, potentially diverting funds or causing donor confusion. While the vulnerability does not expose sensitive donor information or disrupt service availability, the integrity compromise could damage organizational reputation and donor trust, which are critical for fundraising success. Given the widespread use of WordPress and the popularity of GiveWP among European nonprofits, the impact could be significant if exploited at scale. Additionally, manipulation of donation campaigns could have regulatory implications under European data protection and financial transparency laws, such as GDPR and anti-fraud regulations. Organizations relying on GiveWP should consider the potential financial and reputational consequences of this vulnerability.
Mitigation Recommendations
Since no official patch is currently available, European organizations should implement the following mitigations: 1) Restrict access to the vulnerable function by applying custom code or web application firewall (WAF) rules to block unauthenticated requests targeting `registerAssociateFormsWithCampaign`. 2) Monitor logs and audit trails for unusual or unauthorized changes to donation form associations. 3) Temporarily disable or limit the use of the affected functionality if feasible until a patch is released. 4) Ensure WordPress core and all plugins, including GiveWP, are kept up to date once a security update addressing this vulnerability is published. 5) Educate fundraising and IT teams about the risk and signs of exploitation to enable rapid detection and response. 6) Consider implementing multi-factor authentication and role-based access controls for administrative functions related to donation management to reduce risk from other attack vectors. 7) Engage with the GiveWP vendor or community for updates and recommended fixes.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-01T12:00:09.679Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e0877c11971642e85b346c
Added to database: 10/4/2025, 2:33:32 AM
Last enriched: 10/11/2025, 8:42:22 AM
Last updated: 11/20/2025, 7:21:36 AM
Views: 89
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64984: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Kaspersky Kaspersky Endpoint Security
MediumCVE-2024-10295: Incorrect Authorization
HighCVE-2024-0582: Use After Free
HighCVE-2024-0409: Out-of-bounds Write
HighCVE-2024-0408: Improper Neutralization of Null Byte or NUL Character
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.