Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66533: Improper Control of Generation of Code ('Code Injection') in StellarWP GiveWP

0
High
VulnerabilityCVE-2025-66533cvecve-2025-66533
Published: Tue Dec 09 2025 (12/09/2025, 15:03:54 UTC)
Source: CVE Database V5
Vendor/Project: StellarWP
Product: GiveWP

Description

Improper Control of Generation of Code ('Code Injection') vulnerability in StellarWP GiveWP give allows Code Injection.This issue affects GiveWP: from n/a through <= 4.13.1.

AI-Powered Analysis

AILast updated: 01/21/2026, 00:43:31 UTC

Technical Analysis

CVE-2025-66533 is a vulnerability classified as 'Improper Control of Generation of Code' or code injection within the StellarWP GiveWP plugin, a popular WordPress plugin used for managing donations. The affected versions include all releases up to and including 4.13.1. This vulnerability allows an attacker with low privileges (PR:L) and no user interaction (UI:N) to inject and execute arbitrary code within the context of the WordPress environment. The CVSS v3.1 base score of 7.8 reflects high severity, with impacts on confidentiality, integrity, and availability (all rated high). The attack vector is local (AV:L), meaning the attacker needs some level of access to the system, such as a compromised user account with limited privileges. The vulnerability does not require user interaction, increasing the risk of automated exploitation once an attacker gains initial access. Although no known exploits are currently reported in the wild, the nature of code injection vulnerabilities typically allows attackers to execute malicious payloads, potentially leading to full system compromise, data theft, defacement, or denial of service. The vulnerability was reserved and published in early December 2025, with no patch links currently available, indicating that remediation may still be pending. The plugin’s role in handling donation transactions means that exploitation could expose sensitive donor information and disrupt fundraising operations.

Potential Impact

For European organizations, especially nonprofits and charities relying on GiveWP for donation processing, this vulnerability poses a significant risk. Exploitation could lead to unauthorized code execution, allowing attackers to access or modify sensitive donor data, manipulate donation records, or disrupt website availability. This could result in financial loss, reputational damage, and regulatory penalties under GDPR due to data breaches. The local attack vector suggests that attackers who have gained limited access to the WordPress environment—via phishing, credential reuse, or other means—could escalate privileges or move laterally. The high impact on confidentiality, integrity, and availability means that critical donation infrastructure could be compromised, affecting fundraising capabilities and trust. Additionally, given the widespread use of WordPress and the plugin’s popularity, the threat surface is broad across European nonprofit sectors.

Mitigation Recommendations

Organizations should immediately inventory their WordPress installations to identify the use of GiveWP and verify the plugin version. Until a patch is released, restrict access to the WordPress admin area and plugin management to trusted users only, employing strong authentication methods such as multi-factor authentication. Limit user privileges to the minimum necessary to reduce the risk of exploitation by low-privilege accounts. Monitor logs for unusual activity indicative of code injection attempts or privilege escalation. Employ web application firewalls (WAFs) with rules targeting known WordPress plugin vulnerabilities to block suspicious requests. Regularly back up WordPress sites and databases to enable rapid recovery if exploitation occurs. Once patches become available, prioritize their deployment in all affected environments. Additionally, conduct security awareness training to reduce the risk of initial access through compromised credentials.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-04T04:07:13.047Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69383cf4795dcaf6c5045d13

Added to database: 12/9/2025, 3:15:00 PM

Last enriched: 1/21/2026, 12:43:31 AM

Last updated: 2/7/2026, 7:03:50 AM

Views: 176

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats