CVE-2025-5275: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in smub Charitable – Donation Plugin for WordPress – Fundraising with Recurring Donations & More
The Charitable – Donation Plugin for WordPress – Fundraising with Recurring Donations & More plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the privacy settings fields in all versions up to, and including, 1.8.6.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. This issue was partially fixed in version 1.8.6.1 and fully fixed in version 1.8.6.2.
AI Analysis
Technical Summary
CVE-2025-5275 identifies a stored cross-site scripting (XSS) vulnerability in the Charitable – Donation Plugin for WordPress, a plugin designed to facilitate fundraising with recurring donations. The vulnerability exists due to improper neutralization of input during web page generation (CWE-79), specifically within the privacy settings fields. In affected versions up to and including 1.8.6.1, the plugin fails to adequately sanitize and escape user-supplied input before rendering it in web pages. This flaw enables an attacker with administrator-level privileges to inject arbitrary JavaScript code that is stored persistently and executed whenever a user views the infected page. The vulnerability is limited to multisite WordPress installations or those where the unfiltered_html capability is disabled, which restricts HTML input filtering. The partial fix in version 1.8.6.1 addressed some aspects of the issue, but a complete resolution was only achieved in version 1.8.6.2. The CVSS 3.1 base score of 4.4 reflects a network attack vector with high attack complexity, requiring privileges and no user interaction, impacting confidentiality and integrity but not availability. No public exploits have been observed, but the vulnerability poses a risk of session hijacking, privilege escalation, or defacement if exploited. The plugin is widely used in WordPress environments focused on charitable fundraising, making the vulnerability relevant to organizations relying on this software for donation management.
Potential Impact
The primary impact of this vulnerability is the potential compromise of confidentiality and integrity within affected WordPress sites. An attacker with administrator access can inject malicious scripts that execute in the context of other users, potentially stealing session cookies, performing unauthorized actions, or defacing content. This can lead to unauthorized access, data leakage, or reputational damage for organizations relying on the plugin for fundraising activities. Since the vulnerability requires administrator privileges, the initial compromise vector is limited; however, once exploited, it can affect all users accessing the infected pages. Multisite installations are particularly at risk due to the broader scope of user access. The vulnerability does not affect availability directly but can indirectly disrupt operations through trust erosion or administrative overhead. Organizations using this plugin in sectors such as non-profits, charities, and fundraising platforms worldwide could face targeted attacks aiming to undermine donor confidence or steal sensitive information.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the Charitable – Donation Plugin to version 1.8.6.2 or later, where the issue is fully resolved. Administrators should audit multisite WordPress installations and verify that unfiltered_html capabilities are appropriately configured to minimize risk. Implementing strict input validation and output encoding on all user-supplied data fields, especially in privacy settings, is critical. Additionally, restricting administrator access to trusted personnel and employing multi-factor authentication can reduce the risk of privilege abuse. Regular security audits and monitoring for unusual script injections or page modifications can help detect exploitation attempts early. Employing a Web Application Firewall (WAF) with rules targeting XSS payloads may provide an additional layer of defense. Backup procedures should be reviewed to ensure rapid recovery in case of compromise. Finally, educating administrators about the risks of stored XSS and safe plugin management practices will enhance overall security posture.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, France, Netherlands, India, Brazil, South Africa
CVE-2025-5275: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in smub Charitable – Donation Plugin for WordPress – Fundraising with Recurring Donations & More
Description
The Charitable – Donation Plugin for WordPress – Fundraising with Recurring Donations & More plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the privacy settings fields in all versions up to, and including, 1.8.6.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. This issue was partially fixed in version 1.8.6.1 and fully fixed in version 1.8.6.2.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-5275 identifies a stored cross-site scripting (XSS) vulnerability in the Charitable – Donation Plugin for WordPress, a plugin designed to facilitate fundraising with recurring donations. The vulnerability exists due to improper neutralization of input during web page generation (CWE-79), specifically within the privacy settings fields. In affected versions up to and including 1.8.6.1, the plugin fails to adequately sanitize and escape user-supplied input before rendering it in web pages. This flaw enables an attacker with administrator-level privileges to inject arbitrary JavaScript code that is stored persistently and executed whenever a user views the infected page. The vulnerability is limited to multisite WordPress installations or those where the unfiltered_html capability is disabled, which restricts HTML input filtering. The partial fix in version 1.8.6.1 addressed some aspects of the issue, but a complete resolution was only achieved in version 1.8.6.2. The CVSS 3.1 base score of 4.4 reflects a network attack vector with high attack complexity, requiring privileges and no user interaction, impacting confidentiality and integrity but not availability. No public exploits have been observed, but the vulnerability poses a risk of session hijacking, privilege escalation, or defacement if exploited. The plugin is widely used in WordPress environments focused on charitable fundraising, making the vulnerability relevant to organizations relying on this software for donation management.
Potential Impact
The primary impact of this vulnerability is the potential compromise of confidentiality and integrity within affected WordPress sites. An attacker with administrator access can inject malicious scripts that execute in the context of other users, potentially stealing session cookies, performing unauthorized actions, or defacing content. This can lead to unauthorized access, data leakage, or reputational damage for organizations relying on the plugin for fundraising activities. Since the vulnerability requires administrator privileges, the initial compromise vector is limited; however, once exploited, it can affect all users accessing the infected pages. Multisite installations are particularly at risk due to the broader scope of user access. The vulnerability does not affect availability directly but can indirectly disrupt operations through trust erosion or administrative overhead. Organizations using this plugin in sectors such as non-profits, charities, and fundraising platforms worldwide could face targeted attacks aiming to undermine donor confidence or steal sensitive information.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the Charitable – Donation Plugin to version 1.8.6.2 or later, where the issue is fully resolved. Administrators should audit multisite WordPress installations and verify that unfiltered_html capabilities are appropriately configured to minimize risk. Implementing strict input validation and output encoding on all user-supplied data fields, especially in privacy settings, is critical. Additionally, restricting administrator access to trusted personnel and employing multi-factor authentication can reduce the risk of privilege abuse. Regular security audits and monitoring for unusual script injections or page modifications can help detect exploitation attempts early. Employing a Web Application Firewall (WAF) with rules targeting XSS payloads may provide an additional layer of defense. Backup procedures should be reviewed to ensure rapid recovery in case of compromise. Finally, educating administrators about the risks of stored XSS and safe plugin management practices will enhance overall security posture.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-05-27T13:37:54.171Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 685cb6e0e230f5b234861d86
Added to database: 6/26/2025, 2:56:32 AM
Last enriched: 2/27/2026, 3:09:46 PM
Last updated: 3/28/2026, 9:34:37 AM
Views: 61
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.