Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7221: CWE-285 Improper Authorization in givewp GiveWP – Donation Plugin and Fundraising Platform

0
Medium
VulnerabilityCVE-2025-7221cvecve-2025-7221cwe-285
Published: Thu Aug 21 2025 (08/21/2025, 05:28:14 UTC)
Source: CVE Database V5
Vendor/Project: givewp
Product: GiveWP – Donation Plugin and Fundraising Platform

Description

The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the give_update_payment_status() function in all versions up to, and including, 4.5.0. This makes it possible for authenticated attackers, with GiveWP Worker-level access and above, to update donations statuses. This ability is not present in the user interface.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 16:04:21 UTC

Technical Analysis

The vulnerability identified as CVE-2025-7221 affects the GiveWP – Donation Plugin and Fundraising Platform for WordPress, specifically versions up to and including 4.5.0. The root cause is an improper authorization issue (CWE-285) due to a missing capability check in the function give_update_payment_status(). This function can be invoked by authenticated users with GiveWP Worker-level access or higher, allowing them to update donation statuses without proper permission validation. The vulnerability does not manifest in the user interface, meaning the ability to change donation statuses is not exposed through normal UI controls, but can be exploited programmatically or via crafted requests. The CVSS v3.1 score is 4.3 (medium), reflecting that the attack vector is network-based, requires low privileges (authenticated user with specific role), no user interaction, and impacts integrity but not confidentiality or availability. There are no known exploits in the wild at the time of publication. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for interim mitigations. This vulnerability could allow malicious insiders or compromised accounts with Worker-level access to manipulate donation records, potentially leading to financial discrepancies, fraud, or reputational damage for organizations relying on GiveWP for fundraising.

Potential Impact

The primary impact of this vulnerability is on data integrity, as unauthorized users with Worker-level access can alter donation statuses. This could lead to fraudulent manipulation of donation records, such as marking failed or pending donations as completed, or vice versa, which can distort financial reporting and donor trust. Although confidentiality and availability are not directly affected, the integrity compromise can have significant operational and reputational consequences for nonprofits, charities, and other organizations using GiveWP. Attackers exploiting this flaw could undermine fundraising efforts, cause financial losses, and damage stakeholder confidence. Since the vulnerability requires authenticated access with a specific role, the risk is higher in environments where user roles are not tightly controlled or where accounts may be compromised. The absence of UI controls for this function makes detection and auditing more difficult, increasing the risk of unnoticed manipulation. Organizations worldwide that rely on GiveWP for donation processing are at risk, especially those with large donor bases or high transaction volumes.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately review and restrict GiveWP user roles, ensuring that only fully trusted personnel have Worker-level or higher access. Implement strict access control policies and audit user permissions regularly. Monitor logs and donation status changes for unusual or unauthorized modifications. If possible, disable or restrict programmatic access to the give_update_payment_status() function until a patch is available. Employ Web Application Firewalls (WAFs) to detect and block suspicious requests targeting this function. Organizations should also keep abreast of updates from the GiveWP vendor and apply patches promptly once released. Additionally, consider implementing multi-factor authentication (MFA) for all users with elevated privileges to reduce the risk of account compromise. Conduct regular security training to raise awareness about insider threats and the importance of role-based access control. Finally, maintain backups of donation data to enable recovery in case of manipulation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-07T14:36:20.359Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a7389bad5a09ad00121fd2

Added to database: 8/21/2025, 3:17:47 PM

Last enriched: 2/26/2026, 4:04:21 PM

Last updated: 3/25/2026, 7:02:01 AM

Views: 238

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses