Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66533: Improper Control of Generation of Code ('Code Injection') in StellarWP GiveWP

0
High
VulnerabilityCVE-2025-66533cvecve-2025-66533
Published: Tue Dec 09 2025 (12/09/2025, 15:03:54 UTC)
Source: CVE Database V5
Vendor/Project: StellarWP
Product: GiveWP

Description

Improper Control of Generation of Code ('Code Injection') vulnerability in StellarWP GiveWP give allows Code Injection.This issue affects GiveWP: from n/a through <= 4.13.1.

AI-Powered Analysis

AILast updated: 12/09/2025, 15:18:21 UTC

Technical Analysis

CVE-2025-66533 is a critical code injection vulnerability identified in the StellarWP GiveWP plugin, a widely used WordPress plugin designed for donation and fundraising management. The vulnerability exists in versions up to and including 4.13.1, where improper control over the generation of code allows an attacker to inject arbitrary code into the application. This flaw can be exploited remotely without authentication, enabling attackers to execute malicious code within the context of the web server hosting the WordPress site. The root cause is insufficient sanitization or validation of user-supplied input that is subsequently used in code generation or execution paths within the plugin. Exploitation could lead to full site compromise, including data theft, defacement, or pivoting to internal networks. Although no known exploits have been reported in the wild, the lack of available patches and the critical nature of the vulnerability necessitate urgent attention. The vulnerability was reserved and published in December 2025, but no CVSS score or official patch links have been provided yet, indicating that remediation may still be in progress. Organizations using GiveWP should consider this a high-risk threat due to the plugin's role in handling sensitive financial transactions and donor information.

Potential Impact

For European organizations, the impact of CVE-2025-66533 can be severe. Many nonprofits, charities, and fundraising entities across Europe rely on GiveWP to manage donations, making them prime targets for attackers seeking financial gain or data theft. Exploitation could lead to unauthorized access to donor data, financial information, and administrative controls, resulting in reputational damage, regulatory penalties under GDPR, and financial losses. Additionally, compromised WordPress sites could be used to distribute malware or launch further attacks within organizational networks. The availability of the affected plugin across numerous European countries, combined with the critical nature of the vulnerability, means that organizations with limited cybersecurity resources are particularly vulnerable. The threat also poses risks to e-commerce and membership sites using GiveWP for payment processing, potentially exposing payment details and personal data. The lack of patches increases the window of exposure, amplifying the risk of exploitation.

Mitigation Recommendations

1. Immediately audit all WordPress installations to identify the use of the GiveWP plugin and verify the installed version. 2. Restrict administrative and plugin management access to trusted personnel only, employing strong authentication methods such as MFA. 3. Implement web application firewalls (WAF) with custom rules to detect and block suspicious input patterns that could indicate code injection attempts targeting GiveWP. 4. Monitor logs for unusual activity, including unexpected code execution or changes to plugin files. 5. Until an official patch is released, consider disabling the GiveWP plugin or replacing it with alternative donation management solutions if feasible. 6. Keep WordPress core and all plugins updated regularly to reduce exposure to known vulnerabilities. 7. Educate site administrators about the risks of code injection and the importance of validating user inputs. 8. Prepare an incident response plan specific to WordPress compromises, including backups and recovery procedures. 9. Engage with StellarWP or trusted security vendors to obtain timely updates and patches once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-04T04:07:13.047Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69383cf4795dcaf6c5045d13

Added to database: 12/9/2025, 3:15:00 PM

Last enriched: 12/9/2025, 3:18:21 PM

Last updated: 12/11/2025, 4:13:27 AM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats