Skip to main content

CVE-2025-7221: CWE-285 Improper Authorization in givewp GiveWP – Donation Plugin and Fundraising Platform

Medium
VulnerabilityCVE-2025-7221cvecve-2025-7221cwe-285
Published: Thu Aug 21 2025 (08/21/2025, 05:28:14 UTC)
Source: CVE Database V5
Vendor/Project: givewp
Product: GiveWP – Donation Plugin and Fundraising Platform

Description

The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the give_update_payment_status() function in all versions up to, and including, 4.5.0. This makes it possible for authenticated attackers, with GiveWP Worker-level access and above, to update donations statuses. This ability is not present in the user interface.

AI-Powered Analysis

AILast updated: 08/21/2025, 15:32:52 UTC

Technical Analysis

CVE-2025-7221 is a medium-severity vulnerability affecting the GiveWP – Donation Plugin and Fundraising Platform for WordPress, specifically all versions up to and including 4.5.0. The vulnerability stems from improper authorization (CWE-285) due to a missing capability check in the function give_update_payment_status(). This flaw allows authenticated users with GiveWP Worker-level access or higher to modify donation statuses without proper authorization. Notably, this capability is not exposed through the user interface, implying that exploitation requires direct interaction with the vulnerable function, likely via crafted requests or API calls. The vulnerability does not affect confidentiality or availability but impacts integrity by allowing unauthorized modification of donation data. The CVSS 3.1 score is 4.3 (medium), reflecting that the attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N), and the scope remains unchanged (S:U). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was publicly disclosed in August 2025, with the initial reservation in July 2025. This issue could be leveraged by insiders or compromised accounts with Worker-level permissions to manipulate donation statuses, potentially impacting financial reporting, donor trust, and fundraising integrity.

Potential Impact

For European organizations using GiveWP for fundraising and donation management, this vulnerability poses a risk to the integrity of donation data. Unauthorized modification of donation statuses could lead to inaccurate financial records, misrepresentation of fundraising outcomes, and potential compliance issues with financial regulations such as GDPR and anti-fraud laws. Nonprofits and charities relying on GiveWP could face reputational damage if donors discover manipulation or inconsistencies in donation records. While the vulnerability does not directly expose sensitive donor information or disrupt service availability, the ability to alter donation statuses undermines trust and could facilitate fraudulent activities, such as falsely marking donations as completed or refunded. Given the widespread use of WordPress and the popularity of GiveWP in European nonprofit sectors, the impact could be significant if exploited, especially in organizations with multiple users having Worker-level access or higher.

Mitigation Recommendations

European organizations should immediately audit user roles and permissions within GiveWP, ensuring that only trusted personnel have Worker-level or higher access. Implement strict access controls and monitor logs for unusual activity related to donation status changes. Since no official patch is currently linked, organizations should consider applying custom capability checks or temporarily restricting access to the give_update_payment_status() function via WordPress hooks or custom code. Additionally, enable multi-factor authentication (MFA) for all users with elevated privileges to reduce the risk of account compromise. Regularly back up donation data and implement integrity checks to detect unauthorized modifications. Organizations should also stay alert for official patches or updates from GiveWP and apply them promptly once available. Finally, consider isolating the donation management system from other critical infrastructure to limit lateral movement in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-07T14:36:20.359Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a7389bad5a09ad00121fd2

Added to database: 8/21/2025, 3:17:47 PM

Last enriched: 8/21/2025, 3:32:52 PM

Last updated: 8/21/2025, 3:32:52 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats