Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58938: Missing Authorization in ThemeAtelier IDonatePro

0
High
VulnerabilityCVE-2025-58938cvecve-2025-58938
Published: Thu Dec 18 2025 (12/18/2025, 07:21:57 UTC)
Source: CVE Database V5
Vendor/Project: ThemeAtelier
Product: IDonatePro

Description

Missing Authorization vulnerability in ThemeAtelier IDonatePro idonate-pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects IDonatePro: from n/a through <= 2.1.9.

AI-Powered Analysis

AILast updated: 01/28/2026, 19:43:27 UTC

Technical Analysis

CVE-2025-58938 identifies a Missing Authorization vulnerability in the ThemeAtelier IDonatePro plugin, versions up to and including 2.1.9. This vulnerability stems from incorrectly configured access control mechanisms within the plugin, allowing users with limited privileges (PR:L) to perform unauthorized actions or access sensitive data without proper authorization checks. The vulnerability is exploitable remotely over the network (AV:N) without requiring user interaction (UI:N), increasing its risk profile. The CVSS 3.1 base score of 7.6 indicates a high-severity issue, with a high impact on confidentiality (C:H), low impact on integrity (I:L), and low impact on availability (A:L). The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component. Although no known exploits are currently reported in the wild, the nature of the flaw suggests that attackers could leverage it to access sensitive donation-related information or manipulate plugin functionality, potentially leading to data leakage or service disruption. The vulnerability was reserved in September 2025 and published in December 2025, but no official patches or fixes have been released yet. The plugin is commonly used in WordPress environments to facilitate donation management, making it a target for attackers seeking to exploit access control weaknesses in nonprofit or fundraising websites.

Potential Impact

For European organizations, especially nonprofits, charities, and fundraising platforms using the IDonatePro plugin, this vulnerability poses a significant risk. Unauthorized access could lead to exposure of donor information, financial data, or internal administrative functions, undermining confidentiality and trust. Integrity could be compromised if attackers manipulate donation records or plugin settings, although the impact here is rated low. Availability may be affected if attackers disrupt plugin operations or cause denial of service conditions. Given the plugin’s role in handling donations, any disruption or data breach could have reputational and financial consequences. Organizations in Europe must consider GDPR implications, as unauthorized data access could lead to regulatory penalties. The lack of a patch increases the window of exposure, emphasizing the need for immediate compensating controls. The vulnerability’s network exploitability and no requirement for user interaction increase the likelihood of automated attacks or exploitation by insiders with limited privileges.

Mitigation Recommendations

1. Immediately audit and restrict access permissions to the IDonatePro plugin, ensuring only fully trusted administrators have access. 2. Implement strict role-based access controls (RBAC) within WordPress to limit users’ capabilities related to the plugin. 3. Monitor logs for unusual access patterns or attempts to access restricted plugin functions. 4. Temporarily disable or remove the IDonatePro plugin if feasible until a patch is available. 5. Use web application firewalls (WAF) to block suspicious requests targeting the plugin endpoints. 6. Keep WordPress core and all other plugins updated to reduce overall attack surface. 7. Engage with ThemeAtelier or the plugin’s support channels to obtain updates or patches as soon as they are released. 8. Conduct internal training to raise awareness about the risks of privilege misuse and encourage reporting of anomalies. 9. Review GDPR compliance measures related to data protection and breach notification in case of exploitation. 10. Consider deploying additional monitoring tools to detect exploitation attempts in real time.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-06T04:44:48.015Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b0454eb3efac366ff8de

Added to database: 12/18/2025, 7:41:57 AM

Last enriched: 1/28/2026, 7:43:27 PM

Last updated: 2/4/2026, 6:18:56 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats