Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22715: Missing Authorization in loopus WP Attractive Donations System - Easy Stripe & Paypal donations

0
High
VulnerabilityCVE-2025-22715cvecve-2025-22715
Published: Thu Jan 08 2026 (01/08/2026, 09:17:39 UTC)
Source: CVE Database V5
Vendor/Project: loopus
Product: WP Attractive Donations System - Easy Stripe & Paypal donations

Description

Missing Authorization vulnerability in loopus WP Attractive Donations System - Easy Stripe & Paypal donations WP_AttractiveDonationsSystem allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Attractive Donations System - Easy Stripe & Paypal donations: from n/a through <= 1.25.

AI-Powered Analysis

AILast updated: 01/22/2026, 20:33:23 UTC

Technical Analysis

CVE-2025-22715 identifies a missing authorization vulnerability in the WP Attractive Donations System plugin, which integrates Stripe and PayPal payment gateways into WordPress sites for donation processing. The vulnerability arises from incorrectly configured access control security levels, allowing attackers with low privileges (PR:L) to bypass authorization checks and perform unauthorized operations without requiring user interaction (UI:N). The attack vector is network-based (AV:N), meaning exploitation can be attempted remotely. The flaw affects all versions up to and including 1.25 of the plugin. Exploitation could lead to unauthorized access to sensitive donation data, manipulation of donation records, or unauthorized financial transactions, impacting confidentiality and integrity but not availability. Although no public exploits are currently known, the vulnerability's high CVSS score (8.1) reflects its potential impact and ease of exploitation. The vulnerability was reserved in early 2025 and published in January 2026, indicating recent discovery and disclosure. The plugin is commonly used by organizations to facilitate donations, making the vulnerability particularly relevant to entities relying on online fundraising. The lack of patches at the time of disclosure necessitates immediate risk mitigation through access restrictions and monitoring until updates are released.

Potential Impact

For European organizations, especially nonprofits, charities, and NGOs that rely on WordPress-based donation systems, this vulnerability poses a significant risk. Unauthorized access could lead to exposure or manipulation of donor information, financial fraud, and loss of donor trust. The integrity of donation records could be compromised, potentially leading to financial discrepancies and reputational damage. Given the plugin’s integration with Stripe and PayPal, attackers might exploit the vulnerability to interfere with payment processing or redirect funds. The impact extends beyond individual organizations to the broader ecosystem of charitable giving in Europe, potentially undermining confidence in online donation platforms. Additionally, regulatory implications under GDPR arise if personal data is exposed or mishandled. The vulnerability’s remote exploitability and lack of required user interaction increase the likelihood of exploitation, making it a pressing concern for European entities using this plugin.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations to identify the presence of the WP Attractive Donations System plugin and its version. Until an official patch is released, restrict access to the plugin’s administrative interfaces by IP whitelisting or VPN access to limit exposure. Implement strict role-based access controls to ensure only trusted users have privileges to manage the plugin. Monitor logs for unusual activity related to donation processing or plugin endpoints. Consider temporarily disabling the plugin if feasible, especially if it is not critical to operations. Stay informed through vendor and security advisories for patch releases and apply updates promptly. Additionally, conduct regular security assessments of WordPress plugins and maintain a robust backup strategy to recover from potential compromises. Employ web application firewalls (WAFs) with rules targeting suspicious access patterns to the plugin’s endpoints. Finally, educate staff about the risks and signs of exploitation attempts related to donation systems.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-01-07T21:03:35.333Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695f7a58c901b06321d0bb47

Added to database: 1/8/2026, 9:35:20 AM

Last enriched: 1/22/2026, 8:33:23 PM

Last updated: 2/6/2026, 2:49:42 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats