CVE-2025-58956

7.1 HIGH

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in the WP Attractive Donations System WordPress plugin allows attackers to trick authenticated administrators into performing unintended actions, potentially leading to stored cross-site scripting (XSS). This affects all versions of the plugin up to an unspecified version, compromising WordPress sites using it.

💻 Affected Systems

Products:
  • WP Attractive Donations System (WordPress plugin)
Versions: All versions up to an unspecified version (n/a through n/a)
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects default configurations of the plugin; no special settings are required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject malicious scripts into the site, leading to data theft, session hijacking, or complete site takeover by compromising admin accounts.

🟠

Likely Case

Attackers exploit CSRF to inject XSS payloads, defacing the site or stealing user cookies and credentials from visitors.

🟢

If Mitigated

With CSRF protections like nonces enabled, the vulnerability is blocked, preventing unauthorized actions and XSS injection.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated admin into clicking a malicious link, but no public proof-of-concept is confirmed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check the vendor advisory for the fixed version, as specific version details are not provided in the CVE.

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/wp-attractive-donations-system-easy-stripe-paypal-donations/vulnerability/wordpress-wp-attractive-donations-system-plugin-1-29-cross-site-request-forgery-csrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into the WordPress admin dashboard. 2. Navigate to Plugins > Installed Plugins. 3. Find 'WP Attractive Donations System' and update to the latest version. 4. Verify the update completes successfully.

🔧 Temporary Workarounds

Implement CSRF Tokens Manually

all

Add nonce verification to plugin forms to prevent CSRF attacks, though this requires code modifications.

Modify plugin PHP files to include wp_nonce_field() and wp_verify_nonce() checks in form handling.

Use Security Plugins

all

Install a WordPress security plugin that includes CSRF protection, such as Wordfence or Sucuri, to mitigate the risk.

Install and activate a security plugin from the WordPress plugin repository.

🧯 If You Can't Patch

  • Disable or uninstall the WP Attractive Donations System plugin to remove the vulnerability entirely.
  • Restrict admin access to trusted IP addresses only using firewall rules or .htaccess configurations.

🔍 How to Verify

Check if Vulnerable:

Check the plugin version in WordPress admin under Plugins > Installed Plugins; if it's an older version without updates, it may be vulnerable.

Check Version:

In WordPress, run: wp plugin list --name='WP Attractive Donations System' --field=version (requires WP-CLI)

Verify Fix Applied:

After updating, confirm the plugin version is the latest and test admin forms for CSRF protections (e.g., nonce fields in HTML).

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to plugin admin endpoints without referrer or nonce validation in WordPress logs.

Network Indicators:

  • Suspicious outbound traffic from the site indicating data exfiltration due to XSS payloads.

SIEM Query:

Example: source="wordpress.log" AND (uri="/wp-admin/admin-ajax.php" OR uri CONTAINS "wp-attractive-donations") AND status=200 AND user_agent="malicious"

🔗 References

📤 Share & Export