Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58999: Cross-Site Request Forgery (CSRF) in loopus WP Attractive Donations System - Easy Stripe & Paypal donations

0
Medium
VulnerabilityCVE-2025-58999cvecve-2025-58999
Published: Tue Dec 16 2025 (12/16/2025, 08:12:46 UTC)
Source: CVE Database V5
Vendor/Project: loopus
Product: WP Attractive Donations System - Easy Stripe & Paypal donations

Description

Cross-Site Request Forgery (CSRF) vulnerability in loopus WP Attractive Donations System - Easy Stripe & Paypal donations WP_AttractiveDonationsSystem allows Cross Site Request Forgery.This issue affects WP Attractive Donations System - Easy Stripe & Paypal donations: from n/a through <= 1.25.

AI-Powered Analysis

AILast updated: 12/16/2025, 08:32:46 UTC

Technical Analysis

CVE-2025-58999 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the WordPress plugin 'WP Attractive Donations System - Easy Stripe & Paypal donations' developed by loopus, affecting all versions up to and including 1.25. CSRF vulnerabilities occur when a web application does not sufficiently verify that requests made to it originate from legitimate users, allowing attackers to craft malicious web pages that trigger unintended actions on behalf of authenticated users. In this case, the plugin lacks proper CSRF protections, enabling attackers to cause authenticated administrators or users with sufficient privileges to unknowingly perform actions such as modifying donation settings or initiating donation transactions via Stripe or PayPal. The vulnerability does not require prior authentication beyond the victim being logged in, and no user interaction beyond visiting a malicious site is necessary. Although no known exploits have been reported in the wild, the vulnerability poses a significant risk given the financial nature of the plugin's functionality. The absence of a CVSS score indicates that the vulnerability is newly published and has not yet been fully assessed. The plugin is commonly used by organizations to facilitate donations, making the integrity and availability of its operations critical. The vulnerability was reserved in September 2025 and published in December 2025, with no patches currently available, highlighting the urgency for mitigation measures.

Potential Impact

For European organizations, particularly nonprofits, charities, and fundraising platforms relying on the WP Attractive Donations System plugin, this vulnerability could lead to unauthorized manipulation of donation processes. Attackers could initiate fraudulent donation transactions, alter donation settings, or disrupt the donation flow, potentially causing financial losses, reputational damage, and loss of donor trust. The integrity of donation data could be compromised, and availability of donation services may be affected if attackers exploit the vulnerability to disrupt operations. Since Stripe and PayPal are widely used payment gateways in Europe, misuse of these integrations could have direct financial implications. Organizations with limited cybersecurity resources or delayed patching processes are at higher risk. Additionally, regulatory compliance concerns, such as GDPR, may arise if donor data integrity or confidentiality is impacted. The threat is particularly relevant for European countries with large nonprofit sectors and high WordPress adoption rates.

Mitigation Recommendations

Organizations should immediately audit their use of the WP Attractive Donations System plugin and restrict administrative access to trusted personnel only. Until an official patch is released, implement web application firewall (WAF) rules to detect and block suspicious CSRF attack patterns targeting donation-related endpoints. Enforce multi-factor authentication (MFA) for all administrative accounts to reduce the risk of session hijacking. Review and harden WordPress security configurations, including limiting plugin permissions and disabling unnecessary features. Monitor logs for unusual donation transactions or configuration changes. Educate users about the risks of visiting untrusted websites while logged into administrative accounts. Once available, promptly apply vendor patches or updates that address the CSRF vulnerability. Consider isolating donation management functions to dedicated, hardened environments or using alternative plugins with robust security controls. Regularly back up donation data to enable recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-06T04:45:29.150Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6941174b594e45819d70bb16

Added to database: 12/16/2025, 8:24:43 AM

Last enriched: 12/16/2025, 8:32:46 AM

Last updated: 12/18/2025, 4:35:34 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats