CVE-2025-67467: Cross-Site Request Forgery (CSRF) in StellarWP GiveWP
Cross-Site Request Forgery (CSRF) vulnerability in StellarWP GiveWP give allows Cross Site Request Forgery.This issue affects GiveWP: from n/a through <= 4.13.1.
AI Analysis
Technical Summary
CVE-2025-67467 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the GiveWP plugin developed by StellarWP, affecting versions up to and including 4.13.1. CSRF vulnerabilities enable attackers to induce authenticated users to perform unwanted actions on a web application without their consent. In this case, the attacker must have high privileges (e.g., administrator or editor roles) and trick the user into interacting with a maliciously crafted request, such as clicking a link or visiting a webpage. The vulnerability does not expose confidential data or disrupt service availability but can compromise data integrity by allowing unauthorized modifications within the GiveWP plugin's context, potentially altering donation settings or records. The CVSS 3.1 base score is 4.5, reflecting network attack vector (AV:N), low attack complexity (AC:L), requirement for privileges (PR:H), user interaction (UI:R), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and no availability impact (A:N). No patches or exploits are currently documented, but the vulnerability is publicly disclosed and should be addressed promptly. The plugin is widely used by nonprofits and organizations relying on WordPress for donation management, making it a relevant concern for entities handling charitable contributions or fundraising activities.
Potential Impact
For European organizations, especially nonprofits and charities using the GiveWP plugin, this vulnerability poses a risk of unauthorized changes to donation configurations or records, potentially leading to financial discrepancies or reputational damage. While the vulnerability does not allow data theft or service disruption, integrity violations could undermine trust in donation processes. Attackers exploiting this flaw require high privileges and user interaction, limiting the attack surface primarily to insiders or targeted phishing campaigns. However, given the widespread use of WordPress and GiveWP in Europe, the potential impact on fundraising operations and donor confidence is significant. Organizations failing to mitigate this vulnerability may face compliance issues under data integrity and operational security requirements, particularly under GDPR mandates emphasizing data accuracy and protection.
Mitigation Recommendations
1. Apply official patches or updates from StellarWP as soon as they become available to remediate the CSRF vulnerability. 2. Implement strict anti-CSRF tokens in all forms and state-changing requests within the GiveWP plugin to ensure requests originate from legitimate users. 3. Restrict administrative and high-privilege access to trusted personnel only and enforce multi-factor authentication (MFA) to reduce the risk of compromised accounts. 4. Conduct user awareness training to recognize phishing attempts that could trigger malicious CSRF requests. 5. Monitor logs for unusual administrative actions or unexpected changes in donation settings to detect potential exploitation attempts. 6. Consider deploying Web Application Firewalls (WAF) with custom rules to block suspicious cross-site requests targeting GiveWP endpoints. 7. Regularly audit plugin usage and permissions to ensure minimal privilege principles are enforced. These steps go beyond generic advice by focusing on privilege restriction, user interaction risk reduction, and proactive monitoring tailored to the GiveWP environment.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Belgium
CVE-2025-67467: Cross-Site Request Forgery (CSRF) in StellarWP GiveWP
Description
Cross-Site Request Forgery (CSRF) vulnerability in StellarWP GiveWP give allows Cross Site Request Forgery.This issue affects GiveWP: from n/a through <= 4.13.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-67467 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the GiveWP plugin developed by StellarWP, affecting versions up to and including 4.13.1. CSRF vulnerabilities enable attackers to induce authenticated users to perform unwanted actions on a web application without their consent. In this case, the attacker must have high privileges (e.g., administrator or editor roles) and trick the user into interacting with a maliciously crafted request, such as clicking a link or visiting a webpage. The vulnerability does not expose confidential data or disrupt service availability but can compromise data integrity by allowing unauthorized modifications within the GiveWP plugin's context, potentially altering donation settings or records. The CVSS 3.1 base score is 4.5, reflecting network attack vector (AV:N), low attack complexity (AC:L), requirement for privileges (PR:H), user interaction (UI:R), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and no availability impact (A:N). No patches or exploits are currently documented, but the vulnerability is publicly disclosed and should be addressed promptly. The plugin is widely used by nonprofits and organizations relying on WordPress for donation management, making it a relevant concern for entities handling charitable contributions or fundraising activities.
Potential Impact
For European organizations, especially nonprofits and charities using the GiveWP plugin, this vulnerability poses a risk of unauthorized changes to donation configurations or records, potentially leading to financial discrepancies or reputational damage. While the vulnerability does not allow data theft or service disruption, integrity violations could undermine trust in donation processes. Attackers exploiting this flaw require high privileges and user interaction, limiting the attack surface primarily to insiders or targeted phishing campaigns. However, given the widespread use of WordPress and GiveWP in Europe, the potential impact on fundraising operations and donor confidence is significant. Organizations failing to mitigate this vulnerability may face compliance issues under data integrity and operational security requirements, particularly under GDPR mandates emphasizing data accuracy and protection.
Mitigation Recommendations
1. Apply official patches or updates from StellarWP as soon as they become available to remediate the CSRF vulnerability. 2. Implement strict anti-CSRF tokens in all forms and state-changing requests within the GiveWP plugin to ensure requests originate from legitimate users. 3. Restrict administrative and high-privilege access to trusted personnel only and enforce multi-factor authentication (MFA) to reduce the risk of compromised accounts. 4. Conduct user awareness training to recognize phishing attempts that could trigger malicious CSRF requests. 5. Monitor logs for unusual administrative actions or unexpected changes in donation settings to detect potential exploitation attempts. 6. Consider deploying Web Application Firewalls (WAF) with custom rules to block suspicious cross-site requests targeting GiveWP endpoints. 7. Regularly audit plugin usage and permissions to ensure minimal privilege principles are enforced. These steps go beyond generic advice by focusing on privilege restriction, user interaction risk reduction, and proactive monitoring tailored to the GiveWP environment.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-12-08T16:00:53.489Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69383cf4795dcaf6c5045d16
Added to database: 12/9/2025, 3:15:00 PM
Last enriched: 1/21/2026, 12:44:32 AM
Last updated: 2/6/2026, 10:37:23 PM
Views: 112
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2069: Stack-based Buffer Overflow in ggml-org llama.cpp
MediumCVE-2026-25764: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opf openproject
LowCVE-2026-25763: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in opf openproject
CriticalCVE-2026-2068: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25760: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in BishopFox sliver
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.