CVE-2025-66533: Improper Control of Generation of Code ('Code Injection') in StellarWP GiveWP
Improper Control of Generation of Code ('Code Injection') vulnerability in StellarWP GiveWP give allows Code Injection.This issue affects GiveWP: from n/a through <= 4.13.1.
AI Analysis
Technical Summary
CVE-2025-66533 is a critical code injection vulnerability identified in the StellarWP GiveWP plugin, a widely used WordPress plugin designed for donation and fundraising management. The vulnerability exists in versions up to and including 4.13.1, where improper control over the generation of code allows an attacker to inject arbitrary code into the application. This flaw can be exploited remotely without authentication, enabling attackers to execute malicious code within the context of the web server hosting the WordPress site. The root cause is insufficient sanitization or validation of user-supplied input that is subsequently used in code generation or execution paths within the plugin. Exploitation could lead to full site compromise, including data theft, defacement, or pivoting to internal networks. Although no known exploits have been reported in the wild, the lack of available patches and the critical nature of the vulnerability necessitate urgent attention. The vulnerability was reserved and published in December 2025, but no CVSS score or official patch links have been provided yet, indicating that remediation may still be in progress. Organizations using GiveWP should consider this a high-risk threat due to the plugin's role in handling sensitive financial transactions and donor information.
Potential Impact
For European organizations, the impact of CVE-2025-66533 can be severe. Many nonprofits, charities, and fundraising entities across Europe rely on GiveWP to manage donations, making them prime targets for attackers seeking financial gain or data theft. Exploitation could lead to unauthorized access to donor data, financial information, and administrative controls, resulting in reputational damage, regulatory penalties under GDPR, and financial losses. Additionally, compromised WordPress sites could be used to distribute malware or launch further attacks within organizational networks. The availability of the affected plugin across numerous European countries, combined with the critical nature of the vulnerability, means that organizations with limited cybersecurity resources are particularly vulnerable. The threat also poses risks to e-commerce and membership sites using GiveWP for payment processing, potentially exposing payment details and personal data. The lack of patches increases the window of exposure, amplifying the risk of exploitation.
Mitigation Recommendations
1. Immediately audit all WordPress installations to identify the use of the GiveWP plugin and verify the installed version. 2. Restrict administrative and plugin management access to trusted personnel only, employing strong authentication methods such as MFA. 3. Implement web application firewalls (WAF) with custom rules to detect and block suspicious input patterns that could indicate code injection attempts targeting GiveWP. 4. Monitor logs for unusual activity, including unexpected code execution or changes to plugin files. 5. Until an official patch is released, consider disabling the GiveWP plugin or replacing it with alternative donation management solutions if feasible. 6. Keep WordPress core and all plugins updated regularly to reduce exposure to known vulnerabilities. 7. Educate site administrators about the risks of code injection and the importance of validating user inputs. 8. Prepare an incident response plan specific to WordPress compromises, including backups and recovery procedures. 9. Engage with StellarWP or trusted security vendors to obtain timely updates and patches once available.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-66533: Improper Control of Generation of Code ('Code Injection') in StellarWP GiveWP
Description
Improper Control of Generation of Code ('Code Injection') vulnerability in StellarWP GiveWP give allows Code Injection.This issue affects GiveWP: from n/a through <= 4.13.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-66533 is a critical code injection vulnerability identified in the StellarWP GiveWP plugin, a widely used WordPress plugin designed for donation and fundraising management. The vulnerability exists in versions up to and including 4.13.1, where improper control over the generation of code allows an attacker to inject arbitrary code into the application. This flaw can be exploited remotely without authentication, enabling attackers to execute malicious code within the context of the web server hosting the WordPress site. The root cause is insufficient sanitization or validation of user-supplied input that is subsequently used in code generation or execution paths within the plugin. Exploitation could lead to full site compromise, including data theft, defacement, or pivoting to internal networks. Although no known exploits have been reported in the wild, the lack of available patches and the critical nature of the vulnerability necessitate urgent attention. The vulnerability was reserved and published in December 2025, but no CVSS score or official patch links have been provided yet, indicating that remediation may still be in progress. Organizations using GiveWP should consider this a high-risk threat due to the plugin's role in handling sensitive financial transactions and donor information.
Potential Impact
For European organizations, the impact of CVE-2025-66533 can be severe. Many nonprofits, charities, and fundraising entities across Europe rely on GiveWP to manage donations, making them prime targets for attackers seeking financial gain or data theft. Exploitation could lead to unauthorized access to donor data, financial information, and administrative controls, resulting in reputational damage, regulatory penalties under GDPR, and financial losses. Additionally, compromised WordPress sites could be used to distribute malware or launch further attacks within organizational networks. The availability of the affected plugin across numerous European countries, combined with the critical nature of the vulnerability, means that organizations with limited cybersecurity resources are particularly vulnerable. The threat also poses risks to e-commerce and membership sites using GiveWP for payment processing, potentially exposing payment details and personal data. The lack of patches increases the window of exposure, amplifying the risk of exploitation.
Mitigation Recommendations
1. Immediately audit all WordPress installations to identify the use of the GiveWP plugin and verify the installed version. 2. Restrict administrative and plugin management access to trusted personnel only, employing strong authentication methods such as MFA. 3. Implement web application firewalls (WAF) with custom rules to detect and block suspicious input patterns that could indicate code injection attempts targeting GiveWP. 4. Monitor logs for unusual activity, including unexpected code execution or changes to plugin files. 5. Until an official patch is released, consider disabling the GiveWP plugin or replacing it with alternative donation management solutions if feasible. 6. Keep WordPress core and all plugins updated regularly to reduce exposure to known vulnerabilities. 7. Educate site administrators about the risks of code injection and the importance of validating user inputs. 8. Prepare an incident response plan specific to WordPress compromises, including backups and recovery procedures. 9. Engage with StellarWP or trusted security vendors to obtain timely updates and patches once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-12-04T04:07:13.047Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69383cf4795dcaf6c5045d13
Added to database: 12/9/2025, 3:15:00 PM
Last enriched: 12/9/2025, 3:18:21 PM
Last updated: 12/11/2025, 4:13:27 AM
Views: 67
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9436: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in trustindex Widgets for Google Reviews
MediumCVE-2025-10163: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in fernandobt List category posts
MediumCVE-2025-14485: Command Injection in EFM ipTIME A3004T
LowCVE-2025-13764: CWE-269 Improper Privilege Management in ApusTheme WP CarDealer
CriticalCVE-2025-11467: CWE-918 Server-Side Request Forgery (SSRF) in themeisle RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.