CVE-2025-7205: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in givewp GiveWP – Donation Plugin and Fundraising Platform
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the donor notes parameter in all versions up to, and including, 4.5.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with GiveWP worker-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Additionally, they need to trick an administrator into visiting the legacy version of the site.
AI Analysis
Technical Summary
CVE-2025-7205 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability affecting the GiveWP – Donation Plugin and Fundraising Platform for WordPress, specifically in all versions up to and including 4.5.0. The vulnerability arises due to improper neutralization of input during web page generation (CWE-79), where the donor notes parameter is not sufficiently sanitized or escaped before being rendered on web pages. This flaw allows an authenticated attacker with GiveWP worker-level access or higher to inject arbitrary malicious scripts into pages. These scripts execute in the context of users who visit the affected pages, potentially including administrators. Exploitation requires the attacker to trick an administrator into visiting a legacy version of the site where the vulnerable plugin is active. The CVSS 3.1 base score is 5.4 (medium), reflecting that the attack vector is network-based with low attack complexity, requires privileges (worker-level access), and user interaction (administrator visiting the malicious page). The impact includes limited confidentiality and integrity loss, with no direct availability impact. No known exploits are currently reported in the wild, and no patches are linked yet. The vulnerability is significant because it enables persistent XSS, which can lead to session hijacking, privilege escalation, or further compromise within the WordPress environment hosting donation and fundraising activities.
Potential Impact
For European organizations using GiveWP for donation and fundraising, this vulnerability poses a risk of unauthorized script execution within their WordPress sites. Given that many non-profits, charities, and fundraising entities in Europe rely on WordPress plugins like GiveWP, exploitation could lead to theft of administrative credentials, manipulation of donation data, or defacement of fundraising pages. This undermines trust and could result in financial losses or reputational damage. The requirement for attacker authentication limits the attack surface to insiders or compromised accounts with worker-level privileges, but the potential for privilege escalation or lateral movement within the site remains. Additionally, the need to trick administrators into visiting malicious pages means social engineering is a component of exploitation, which could be facilitated by phishing campaigns targeting European charity staff. The impact on confidentiality and integrity of donation data is particularly sensitive given GDPR and other data protection regulations in Europe, potentially leading to compliance issues if personal data is exposed or altered.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately upgrade the GiveWP plugin to a patched version once available; if no patch exists, consider disabling the plugin temporarily or restricting access to trusted users only. 2) Enforce strict role-based access control to limit worker-level privileges to only essential personnel, reducing the risk of insider exploitation. 3) Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected pages. 4) Conduct regular audits of donor notes and other user-generated content for suspicious scripts or anomalies. 5) Educate administrators and staff on phishing and social engineering risks to prevent them from visiting malicious links. 6) Use Web Application Firewalls (WAF) with custom rules to detect and block attempts to inject or execute malicious scripts via the donor notes parameter. 7) Monitor logs for unusual activity related to GiveWP plugin usage and access patterns. 8) Consider isolating legacy versions of the site or decommissioning them to prevent exploitation via outdated instances.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Belgium
CVE-2025-7205: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in givewp GiveWP – Donation Plugin and Fundraising Platform
Description
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the donor notes parameter in all versions up to, and including, 4.5.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with GiveWP worker-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Additionally, they need to trick an administrator into visiting the legacy version of the site.
AI-Powered Analysis
Technical Analysis
CVE-2025-7205 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability affecting the GiveWP – Donation Plugin and Fundraising Platform for WordPress, specifically in all versions up to and including 4.5.0. The vulnerability arises due to improper neutralization of input during web page generation (CWE-79), where the donor notes parameter is not sufficiently sanitized or escaped before being rendered on web pages. This flaw allows an authenticated attacker with GiveWP worker-level access or higher to inject arbitrary malicious scripts into pages. These scripts execute in the context of users who visit the affected pages, potentially including administrators. Exploitation requires the attacker to trick an administrator into visiting a legacy version of the site where the vulnerable plugin is active. The CVSS 3.1 base score is 5.4 (medium), reflecting that the attack vector is network-based with low attack complexity, requires privileges (worker-level access), and user interaction (administrator visiting the malicious page). The impact includes limited confidentiality and integrity loss, with no direct availability impact. No known exploits are currently reported in the wild, and no patches are linked yet. The vulnerability is significant because it enables persistent XSS, which can lead to session hijacking, privilege escalation, or further compromise within the WordPress environment hosting donation and fundraising activities.
Potential Impact
For European organizations using GiveWP for donation and fundraising, this vulnerability poses a risk of unauthorized script execution within their WordPress sites. Given that many non-profits, charities, and fundraising entities in Europe rely on WordPress plugins like GiveWP, exploitation could lead to theft of administrative credentials, manipulation of donation data, or defacement of fundraising pages. This undermines trust and could result in financial losses or reputational damage. The requirement for attacker authentication limits the attack surface to insiders or compromised accounts with worker-level privileges, but the potential for privilege escalation or lateral movement within the site remains. Additionally, the need to trick administrators into visiting malicious pages means social engineering is a component of exploitation, which could be facilitated by phishing campaigns targeting European charity staff. The impact on confidentiality and integrity of donation data is particularly sensitive given GDPR and other data protection regulations in Europe, potentially leading to compliance issues if personal data is exposed or altered.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately upgrade the GiveWP plugin to a patched version once available; if no patch exists, consider disabling the plugin temporarily or restricting access to trusted users only. 2) Enforce strict role-based access control to limit worker-level privileges to only essential personnel, reducing the risk of insider exploitation. 3) Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected pages. 4) Conduct regular audits of donor notes and other user-generated content for suspicious scripts or anomalies. 5) Educate administrators and staff on phishing and social engineering risks to prevent them from visiting malicious links. 6) Use Web Application Firewalls (WAF) with custom rules to detect and block attempts to inject or execute malicious scripts via the donor notes parameter. 7) Monitor logs for unusual activity related to GiveWP plugin usage and access patterns. 8) Consider isolating legacy versions of the site or decommissioning them to prevent exploitation via outdated instances.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-07T12:05:07.346Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 688b1fa4ad5a09ad00b489ae
Added to database: 7/31/2025, 7:47:48 AM
Last enriched: 7/31/2025, 8:03:00 AM
Last updated: 7/31/2025, 8:28:42 PM
Views: 5
Related Threats
CVE-2025-23289: CWE-532 Insertion of Sensitive Information into Log File in NVIDIA NVIDIA Omniverse Launcher
MediumCVE-2025-48073: CWE-476: NULL Pointer Dereference in AcademySoftwareFoundation openexr
MediumCVE-2025-48072: CWE-125: Out-of-bounds Read in AcademySoftwareFoundation openexr
MediumCVE-2025-48071: CWE-122: Heap-based Buffer Overflow in AcademySoftwareFoundation openexr
HighCVE-2025-45768: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.