Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13001: CWE-89 SQL Injection in donation

0
Medium
VulnerabilityCVE-2025-13001cvecve-2025-13001cwe-89
Published: Tue Dec 02 2025 (12/02/2025, 06:00:07 UTC)
Source: CVE Database V5
Product: donation

Description

The donation WordPress plugin through 1.0 does not sanitize and escape a parameter before using it in a SQL statement, allowing high privilege users, such as admin to perform SQL injection attacks

AI-Powered Analysis

AILast updated: 12/09/2025, 06:41:44 UTC

Technical Analysis

CVE-2025-13001 is a SQL injection vulnerability identified in the WordPress 'donation' plugin versions up to 1.0. The root cause is the plugin's failure to properly sanitize and escape a specific parameter before embedding it into an SQL statement. This vulnerability is classified under CWE-89, which pertains to improper neutralization of special elements used in SQL commands. The flaw allows users with high privileges, such as administrators, to inject malicious SQL code remotely without requiring user interaction. Exploiting this vulnerability could enable attackers to read sensitive data from the database, potentially exposing confidential information. However, the vulnerability does not affect data integrity or availability directly, as the CVSS vector indicates no impact on these aspects. The attack vector is network-based with low attack complexity and requires high privileges, meaning only trusted users with admin rights can exploit it. No known public exploits have been reported yet, but the vulnerability's presence in a widely used CMS plugin makes it a significant concern. The lack of available patches at the time of disclosure necessitates immediate attention to access controls and monitoring. The vulnerability's scope is limited to installations using the affected plugin version, but given WordPress's popularity, the potential attack surface is considerable.

Potential Impact

For European organizations, especially those operating websites or platforms using the WordPress 'donation' plugin, this vulnerability poses a risk of unauthorized data disclosure. Since the flaw requires administrative privileges to exploit, the primary threat is from insider threats or compromised admin accounts. Successful exploitation could lead to exposure of sensitive donor information or internal data stored in the database, undermining confidentiality. Although the vulnerability does not directly impact data integrity or availability, attackers could leverage the information gained for further attacks or social engineering. Nonprofits, charities, and NGOs in Europe that rely on this plugin for fundraising may face reputational damage and regulatory scrutiny under GDPR if donor data is exposed. The medium severity rating indicates a moderate risk, but the potential impact on trust and compliance is significant. Organizations with weak admin credential management or insufficient monitoring are at higher risk. The absence of known exploits reduces immediate threat but does not eliminate future risk, especially as exploit code could be developed post-disclosure.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately audit and restrict administrative access to the WordPress backend, enforcing strong authentication mechanisms such as multi-factor authentication (MFA). 2) Monitor database logs and web server logs for unusual or suspicious SQL queries that could indicate attempted exploitation. 3) Isolate the WordPress environment to limit lateral movement in case of compromise, using network segmentation and least privilege principles. 4) Regularly back up databases and website content to enable recovery if an incident occurs. 5) Apply principle of least privilege to database user accounts used by WordPress, ensuring they have only necessary permissions. 6) Stay alert for official patches or updates from the plugin developer and apply them promptly once released. 7) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the vulnerable parameter. 8) Educate administrators about the risks of SQL injection and the importance of secure plugin management. These steps go beyond generic advice by focusing on access control, monitoring, and environment hardening tailored to this vulnerability's characteristics.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2025-11-11T12:44:18.243Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692e8375fdda6c2fef754182

Added to database: 12/2/2025, 6:13:09 AM

Last enriched: 12/9/2025, 6:41:44 AM

Last updated: 1/16/2026, 1:35:36 PM

Views: 127

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats