CVE-2025-11893: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in smub Charitable – Donation Plugin for WordPress – Fundraising with Recurring Donations & More
The Charitable – Donation Plugin for WordPress – Fundraising with Recurring Donations & More plugin for WordPress is vulnerable to SQL Injection via the donation_ids parameter in all versions up to, and including, 1.8.8.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Exploitation of the vulnerability requires a paid donation.
AI Analysis
Technical Summary
CVE-2025-11893 is a critical SQL Injection vulnerability identified in the Charitable – Donation Plugin for WordPress, specifically versions up to and including 1.8.8.4. The vulnerability stems from insufficient escaping and lack of proper preparation of the donation_ids parameter in SQL queries, which allows attackers with authenticated Subscriber-level access or higher to append arbitrary SQL commands. This improper neutralization of special elements (CWE-89) enables attackers to manipulate backend database queries, potentially extracting sensitive information, modifying data, or causing denial of service. Exploitation requires the attacker to have an authenticated account and to have made a paid donation, which acts as a gating mechanism but does not require elevated privileges beyond Subscriber. The vulnerability affects all versions of the plugin up to 1.8.8.4, with no patches currently available. The CVSS 3.1 base score is 8.8, reflecting network attack vector, low attack complexity, required privileges, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to WordPress sites using this plugin, especially those handling sensitive donor information and recurring donations.
Potential Impact
The exploitation of CVE-2025-11893 can lead to severe consequences for organizations using the affected plugin. Attackers can extract sensitive donor and organizational data, including personal and financial information, leading to privacy breaches and potential regulatory non-compliance. Data integrity can be compromised by unauthorized modification or deletion of records, undermining trust and operational reliability. Availability may be impacted if attackers execute destructive queries or cause database corruption, potentially disrupting fundraising activities and donation processing. Since the vulnerability requires only Subscriber-level access and a paid donation, it lowers the barrier for exploitation within organizations that allow user registrations and donations. This can lead to insider threats or abuse by malicious donors. The reputational damage and financial losses from data breaches and service outages can be significant, especially for non-profit organizations relying on donations. The lack of an available patch increases the urgency for immediate mitigation.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the use of the Charitable – Donation Plugin and verify the plugin version. Until an official patch is released, the following specific mitigations are recommended: 1) Restrict user registration and donation processes to trusted users only, minimizing the risk of malicious authenticated users. 2) Implement Web Application Firewall (WAF) rules to detect and block suspicious SQL injection patterns targeting the donation_ids parameter. 3) Employ database query monitoring and anomaly detection to identify unusual query patterns indicative of injection attempts. 4) Limit database user permissions for the WordPress application to the minimum necessary, preventing unauthorized data access or modification. 5) Consider temporarily disabling the plugin or donation features if feasible, especially if the risk profile is high. 6) Monitor logs for signs of exploitation attempts and prepare incident response plans. 7) Follow vendor communications closely for patches or updates and apply them promptly once available. These targeted actions go beyond generic advice by focusing on access control, monitoring, and immediate risk reduction.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, France, Netherlands, India, Brazil, South Africa
CVE-2025-11893: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in smub Charitable – Donation Plugin for WordPress – Fundraising with Recurring Donations & More
Description
The Charitable – Donation Plugin for WordPress – Fundraising with Recurring Donations & More plugin for WordPress is vulnerable to SQL Injection via the donation_ids parameter in all versions up to, and including, 1.8.8.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Exploitation of the vulnerability requires a paid donation.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-11893 is a critical SQL Injection vulnerability identified in the Charitable – Donation Plugin for WordPress, specifically versions up to and including 1.8.8.4. The vulnerability stems from insufficient escaping and lack of proper preparation of the donation_ids parameter in SQL queries, which allows attackers with authenticated Subscriber-level access or higher to append arbitrary SQL commands. This improper neutralization of special elements (CWE-89) enables attackers to manipulate backend database queries, potentially extracting sensitive information, modifying data, or causing denial of service. Exploitation requires the attacker to have an authenticated account and to have made a paid donation, which acts as a gating mechanism but does not require elevated privileges beyond Subscriber. The vulnerability affects all versions of the plugin up to 1.8.8.4, with no patches currently available. The CVSS 3.1 base score is 8.8, reflecting network attack vector, low attack complexity, required privileges, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to WordPress sites using this plugin, especially those handling sensitive donor information and recurring donations.
Potential Impact
The exploitation of CVE-2025-11893 can lead to severe consequences for organizations using the affected plugin. Attackers can extract sensitive donor and organizational data, including personal and financial information, leading to privacy breaches and potential regulatory non-compliance. Data integrity can be compromised by unauthorized modification or deletion of records, undermining trust and operational reliability. Availability may be impacted if attackers execute destructive queries or cause database corruption, potentially disrupting fundraising activities and donation processing. Since the vulnerability requires only Subscriber-level access and a paid donation, it lowers the barrier for exploitation within organizations that allow user registrations and donations. This can lead to insider threats or abuse by malicious donors. The reputational damage and financial losses from data breaches and service outages can be significant, especially for non-profit organizations relying on donations. The lack of an available patch increases the urgency for immediate mitigation.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the use of the Charitable – Donation Plugin and verify the plugin version. Until an official patch is released, the following specific mitigations are recommended: 1) Restrict user registration and donation processes to trusted users only, minimizing the risk of malicious authenticated users. 2) Implement Web Application Firewall (WAF) rules to detect and block suspicious SQL injection patterns targeting the donation_ids parameter. 3) Employ database query monitoring and anomaly detection to identify unusual query patterns indicative of injection attempts. 4) Limit database user permissions for the WordPress application to the minimum necessary, preventing unauthorized data access or modification. 5) Consider temporarily disabling the plugin or donation features if feasible, especially if the risk profile is high. 6) Monitor logs for signs of exploitation attempts and prepare incident response plans. 7) Follow vendor communications closely for patches or updates and apply them promptly once available. These targeted actions go beyond generic advice by focusing on access control, monitoring, and immediate risk reduction.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-16T20:12:20.027Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68fc745955d697d32d43907b
Added to database: 10/25/2025, 6:55:21 AM
Last enriched: 2/27/2026, 7:39:28 PM
Last updated: 3/24/2026, 9:19:34 PM
Views: 194
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.