CVE-2025-22715: Missing Authorization in loopus WP Attractive Donations System - Easy Stripe & Paypal donations
Missing Authorization vulnerability in loopus WP Attractive Donations System - Easy Stripe & Paypal donations WP_AttractiveDonationsSystem allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Attractive Donations System - Easy Stripe & Paypal donations: from n/a through <= 1.25.
AI Analysis
Technical Summary
CVE-2025-22715 identifies a missing authorization vulnerability in the WP Attractive Donations System plugin, which integrates Stripe and PayPal payment gateways into WordPress sites for donation processing. The vulnerability arises from incorrectly configured access control security levels, allowing attackers with low privileges (PR:L) to bypass authorization checks and perform unauthorized operations without requiring user interaction (UI:N). The attack vector is network-based (AV:N), meaning exploitation can be attempted remotely. The flaw affects all versions up to and including 1.25 of the plugin. Exploitation could lead to unauthorized access to sensitive donation data, manipulation of donation records, or unauthorized financial transactions, impacting confidentiality and integrity but not availability. Although no public exploits are currently known, the vulnerability's high CVSS score (8.1) reflects its potential impact and ease of exploitation. The vulnerability was reserved in early 2025 and published in January 2026, indicating recent discovery and disclosure. The plugin is commonly used by organizations to facilitate donations, making the vulnerability particularly relevant to entities relying on online fundraising. The lack of patches at the time of disclosure necessitates immediate risk mitigation through access restrictions and monitoring until updates are released.
Potential Impact
For European organizations, especially nonprofits, charities, and NGOs that rely on WordPress-based donation systems, this vulnerability poses a significant risk. Unauthorized access could lead to exposure or manipulation of donor information, financial fraud, and loss of donor trust. The integrity of donation records could be compromised, potentially leading to financial discrepancies and reputational damage. Given the plugin’s integration with Stripe and PayPal, attackers might exploit the vulnerability to interfere with payment processing or redirect funds. The impact extends beyond individual organizations to the broader ecosystem of charitable giving in Europe, potentially undermining confidence in online donation platforms. Additionally, regulatory implications under GDPR arise if personal data is exposed or mishandled. The vulnerability’s remote exploitability and lack of required user interaction increase the likelihood of exploitation, making it a pressing concern for European entities using this plugin.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the WP Attractive Donations System plugin and its version. Until an official patch is released, restrict access to the plugin’s administrative interfaces by IP whitelisting or VPN access to limit exposure. Implement strict role-based access controls to ensure only trusted users have privileges to manage the plugin. Monitor logs for unusual activity related to donation processing or plugin endpoints. Consider temporarily disabling the plugin if feasible, especially if it is not critical to operations. Stay informed through vendor and security advisories for patch releases and apply updates promptly. Additionally, conduct regular security assessments of WordPress plugins and maintain a robust backup strategy to recover from potential compromises. Employ web application firewalls (WAFs) with rules targeting suspicious access patterns to the plugin’s endpoints. Finally, educate staff about the risks and signs of exploitation attempts related to donation systems.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Sweden
CVE-2025-22715: Missing Authorization in loopus WP Attractive Donations System - Easy Stripe & Paypal donations
Description
Missing Authorization vulnerability in loopus WP Attractive Donations System - Easy Stripe & Paypal donations WP_AttractiveDonationsSystem allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Attractive Donations System - Easy Stripe & Paypal donations: from n/a through <= 1.25.
AI-Powered Analysis
Technical Analysis
CVE-2025-22715 identifies a missing authorization vulnerability in the WP Attractive Donations System plugin, which integrates Stripe and PayPal payment gateways into WordPress sites for donation processing. The vulnerability arises from incorrectly configured access control security levels, allowing attackers with low privileges (PR:L) to bypass authorization checks and perform unauthorized operations without requiring user interaction (UI:N). The attack vector is network-based (AV:N), meaning exploitation can be attempted remotely. The flaw affects all versions up to and including 1.25 of the plugin. Exploitation could lead to unauthorized access to sensitive donation data, manipulation of donation records, or unauthorized financial transactions, impacting confidentiality and integrity but not availability. Although no public exploits are currently known, the vulnerability's high CVSS score (8.1) reflects its potential impact and ease of exploitation. The vulnerability was reserved in early 2025 and published in January 2026, indicating recent discovery and disclosure. The plugin is commonly used by organizations to facilitate donations, making the vulnerability particularly relevant to entities relying on online fundraising. The lack of patches at the time of disclosure necessitates immediate risk mitigation through access restrictions and monitoring until updates are released.
Potential Impact
For European organizations, especially nonprofits, charities, and NGOs that rely on WordPress-based donation systems, this vulnerability poses a significant risk. Unauthorized access could lead to exposure or manipulation of donor information, financial fraud, and loss of donor trust. The integrity of donation records could be compromised, potentially leading to financial discrepancies and reputational damage. Given the plugin’s integration with Stripe and PayPal, attackers might exploit the vulnerability to interfere with payment processing or redirect funds. The impact extends beyond individual organizations to the broader ecosystem of charitable giving in Europe, potentially undermining confidence in online donation platforms. Additionally, regulatory implications under GDPR arise if personal data is exposed or mishandled. The vulnerability’s remote exploitability and lack of required user interaction increase the likelihood of exploitation, making it a pressing concern for European entities using this plugin.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the WP Attractive Donations System plugin and its version. Until an official patch is released, restrict access to the plugin’s administrative interfaces by IP whitelisting or VPN access to limit exposure. Implement strict role-based access controls to ensure only trusted users have privileges to manage the plugin. Monitor logs for unusual activity related to donation processing or plugin endpoints. Consider temporarily disabling the plugin if feasible, especially if it is not critical to operations. Stay informed through vendor and security advisories for patch releases and apply updates promptly. Additionally, conduct regular security assessments of WordPress plugins and maintain a robust backup strategy to recover from potential compromises. Employ web application firewalls (WAFs) with rules targeting suspicious access patterns to the plugin’s endpoints. Finally, educate staff about the risks and signs of exploitation attempts related to donation systems.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-01-07T21:03:35.333Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 695f7a58c901b06321d0bb47
Added to database: 1/8/2026, 9:35:20 AM
Last enriched: 1/22/2026, 8:33:23 PM
Last updated: 2/6/2026, 2:49:42 AM
Views: 25
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1974: Denial of Service in Free5GC
MediumCVE-2026-1973: NULL Pointer Dereference in Free5GC
MediumCVE-2026-1972: Use of Default Credentials in Edimax BR-6208AC
MediumCVE-2026-1971: Cross Site Scripting in Edimax BR-6288ACL
MediumCVE-2026-23623: CWE-285: Improper Authorization in CollaboraOnline online
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.