CVE-2025-8620: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in givewp GiveWP – Donation Plugin and Fundraising Platform
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 4.6.0. This makes it possible for unauthenticated attackers to extract donor names, emails, and donor id.
AI Analysis
Technical Summary
CVE-2025-8620 is a vulnerability identified in the GiveWP Donation Plugin and Fundraising Platform for WordPress, present in all versions up to and including 4.6.0. The flaw allows unauthenticated attackers to retrieve sensitive donor information, specifically donor names, email addresses, and donor IDs, without requiring any authentication or user interaction. This vulnerability falls under CWE-200, which pertains to the exposure of sensitive information to unauthorized actors. The CVSS v3.1 base score is 5.3, reflecting a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The scope is unchanged (S:U), and the impact is limited to confidentiality (C:L), with no impact on integrity or availability. The vulnerability arises from improper access controls or insufficient data protection mechanisms within the plugin's code, allowing direct access to donor data endpoints or database queries without authentication checks. Although no public exploits have been reported, the ease of exploitation and the sensitivity of the exposed data make this a significant privacy concern. Organizations using GiveWP for fundraising should be aware that donor PII exposure can lead to reputational damage, legal liabilities under data protection regulations such as GDPR or CCPA, and potential phishing or social engineering attacks targeting donors. The vulnerability affects a widely used WordPress plugin, which is popular among nonprofits and fundraising organizations globally. The lack of an official patch at the time of reporting necessitates immediate mitigation efforts to prevent data leakage.
Potential Impact
The primary impact of CVE-2025-8620 is the unauthorized disclosure of personally identifiable information (PII) of donors, including names, email addresses, and donor IDs. This exposure can lead to privacy violations and non-compliance with data protection laws such as GDPR, CCPA, and others, potentially resulting in regulatory fines and legal actions. Organizations may suffer reputational damage and loss of donor trust, which can adversely affect fundraising efforts. Additionally, exposed donor information can be leveraged by attackers for targeted phishing campaigns, social engineering, or identity theft. While the vulnerability does not affect system integrity or availability, the confidentiality breach alone is significant given the sensitivity of donor data. The ease of exploitation—requiring no authentication or user interaction—means that attackers can automate data harvesting at scale, increasing the risk of mass data leaks. Nonprofits and fundraising platforms relying on GiveWP are particularly at risk, and the impact is amplified in regions with strict privacy regulations.
Mitigation Recommendations
Organizations using the GiveWP plugin should immediately verify their plugin version and upgrade to a patched version once available. Until an official patch is released, administrators should implement the following mitigations: 1) Restrict access to the GiveWP plugin endpoints by IP whitelisting or firewall rules to limit exposure to trusted networks only. 2) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting donor data endpoints. 3) Disable or restrict public access to donation data APIs or pages that may expose donor information. 4) Monitor server and application logs for unusual access patterns or repeated requests to sensitive endpoints. 5) Conduct a thorough audit of donor data exposure and notify affected donors if a breach is suspected, in compliance with applicable laws. 6) Consider implementing additional authentication or access control layers around sensitive data retrieval functions within the plugin if customization is possible. 7) Regularly back up data and maintain an incident response plan tailored to data exposure incidents. These steps will help reduce the attack surface and protect donor information until a secure plugin update is deployed.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, France, Netherlands, Sweden, New Zealand, Ireland
CVE-2025-8620: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in givewp GiveWP – Donation Plugin and Fundraising Platform
Description
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 4.6.0. This makes it possible for unauthenticated attackers to extract donor names, emails, and donor id.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-8620 is a vulnerability identified in the GiveWP Donation Plugin and Fundraising Platform for WordPress, present in all versions up to and including 4.6.0. The flaw allows unauthenticated attackers to retrieve sensitive donor information, specifically donor names, email addresses, and donor IDs, without requiring any authentication or user interaction. This vulnerability falls under CWE-200, which pertains to the exposure of sensitive information to unauthorized actors. The CVSS v3.1 base score is 5.3, reflecting a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The scope is unchanged (S:U), and the impact is limited to confidentiality (C:L), with no impact on integrity or availability. The vulnerability arises from improper access controls or insufficient data protection mechanisms within the plugin's code, allowing direct access to donor data endpoints or database queries without authentication checks. Although no public exploits have been reported, the ease of exploitation and the sensitivity of the exposed data make this a significant privacy concern. Organizations using GiveWP for fundraising should be aware that donor PII exposure can lead to reputational damage, legal liabilities under data protection regulations such as GDPR or CCPA, and potential phishing or social engineering attacks targeting donors. The vulnerability affects a widely used WordPress plugin, which is popular among nonprofits and fundraising organizations globally. The lack of an official patch at the time of reporting necessitates immediate mitigation efforts to prevent data leakage.
Potential Impact
The primary impact of CVE-2025-8620 is the unauthorized disclosure of personally identifiable information (PII) of donors, including names, email addresses, and donor IDs. This exposure can lead to privacy violations and non-compliance with data protection laws such as GDPR, CCPA, and others, potentially resulting in regulatory fines and legal actions. Organizations may suffer reputational damage and loss of donor trust, which can adversely affect fundraising efforts. Additionally, exposed donor information can be leveraged by attackers for targeted phishing campaigns, social engineering, or identity theft. While the vulnerability does not affect system integrity or availability, the confidentiality breach alone is significant given the sensitivity of donor data. The ease of exploitation—requiring no authentication or user interaction—means that attackers can automate data harvesting at scale, increasing the risk of mass data leaks. Nonprofits and fundraising platforms relying on GiveWP are particularly at risk, and the impact is amplified in regions with strict privacy regulations.
Mitigation Recommendations
Organizations using the GiveWP plugin should immediately verify their plugin version and upgrade to a patched version once available. Until an official patch is released, administrators should implement the following mitigations: 1) Restrict access to the GiveWP plugin endpoints by IP whitelisting or firewall rules to limit exposure to trusted networks only. 2) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting donor data endpoints. 3) Disable or restrict public access to donation data APIs or pages that may expose donor information. 4) Monitor server and application logs for unusual access patterns or repeated requests to sensitive endpoints. 5) Conduct a thorough audit of donor data exposure and notify affected donors if a breach is suspected, in compliance with applicable laws. 6) Consider implementing additional authentication or access control layers around sensitive data retrieval functions within the plugin if customization is possible. 7) Regularly back up data and maintain an incident response plan tailored to data exposure incidents. These steps will help reduce the attack surface and protect donor information until a secure plugin update is deployed.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-05T20:29:49.881Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6893213dad5a09ad00f0266e
Added to database: 8/6/2025, 9:32:45 AM
Last enriched: 2/26/2026, 5:20:32 PM
Last updated: 3/24/2026, 12:58:44 PM
Views: 115
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.