CVE-2025-8620

5.3 MEDIUM

📋 TL;DR

The GiveWP WordPress plugin up to version 4.6.0 exposes donor information including names, emails, and donor IDs to unauthenticated attackers. This vulnerability affects all WordPress sites using vulnerable versions of the GiveWP donation plugin. Attackers can harvest sensitive donor data without any authentication.

💻 Affected Systems

Products:
  • GiveWP - Donation Plugin and Fundraising Platform
Versions: All versions up to and including 4.6.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable GiveWP plugin versions. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Mass exfiltration of donor PII leading to identity theft, phishing campaigns targeting donors, regulatory fines for data breaches, and reputational damage to the organization.

🟠

Likely Case

Targeted harvesting of donor contact information for spam campaigns, credential stuffing attacks using exposed emails, and potential GDPR/CCPA compliance violations.

🟢

If Mitigated

Limited exposure if plugin is behind authentication or network controls, but still violates data privacy principles.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and appears to be straightforward based on the CWE-200 (Information Exposure) classification.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.6.1 or later

Vendor Advisory: https://github.com/impress-org/givewp/issues/8042

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find GiveWP plugin
4. Click 'Update Now' if update available
5. If no update appears, manually download version 4.6.1+ from WordPress.org
6. Deactivate old plugin, upload new version, activate

🔧 Temporary Workarounds

Temporary Plugin Deactivation

WordPress

Disable the GiveWP plugin until patched to prevent information exposure

wp plugin deactivate give

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block requests to vulnerable endpoints
  • Restrict access to WordPress admin and plugin directories using IP whitelisting

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for GiveWP version. If version is 4.6.0 or lower, you are vulnerable.

Check Version:

wp plugin list --name=give --field=version

Verify Fix Applied:

After updating, verify GiveWP version shows 4.6.1 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual volume of requests to GiveWP API endpoints
  • Requests to donor-related endpoints from unauthenticated users

Network Indicators:

  • Traffic patterns showing data extraction from /wp-json/give/ endpoints

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-json/give/*" OR user_agent="*scanner*") AND http_status=200

🔗 References

📤 Share & Export