CVE-2025-11893

MEDIUM
2025-10-25 [email protected]
6.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

2
Analysis Generated
Apr 08, 2026 - 18:38 vuln.today
CVE Published
Oct 25, 2025 - 07:15 nvd
MEDIUM 6.5

Description

The Charitable - Donation Plugin for WordPress - Fundraising with Recurring Donations & More plugin for WordPress is vulnerable to SQL Injection via the donation_ids parameter in all versions up to, and including, 1.8.8.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Exploitation of the vulnerability requires a paid donation.

Analysis

SQL injection in the Charitable WordPress plugin versions up to 1.8.8.4 allows authenticated users with Subscriber-level access to extract sensitive database information via the donation_ids parameter due to insufficient escaping and lack of prepared statements. The vulnerability requires a paid donation to exploit and affects the donation query processing logic. No public exploit code or active exploitation has been confirmed at the time of analysis, though the flaw is straightforward to weaponize given the low attack complexity and documented vulnerable code path.

Technical Context

The vulnerability exists in the abstract-class-charitable-query.php file where the donation_ids parameter is incorporated into SQL queries without proper escaping or parameterized query preparation. CWE-89 (SQL Injection) is the root cause, stemming from direct concatenation of user-supplied input into database queries. The affected plugin is a WordPress donation and fundraising system that processes financial transactions; the vulnerable code path handles donation query filtering and retrieval. While the CVSS vector indicates PR:L (Subscriber-level privilege required), the execution context within WordPress means this credential threshold is relatively low compared to typical application roles. The CPE for the affected product is wp:plugin:charitable, affecting all versions through 1.8.8.4.

Affected Products

The Charitable WordPress plugin is vulnerable in all versions up to and including 1.8.8.4. The plugin is distributed through the WordPress.org plugin repository and identified by CPE wp:plugin:charitable. Affected installations include any WordPress site running this plugin with user registration enabled and the vulnerable code path active in donation processing workflows.

Remediation

Update the Charitable plugin to version 1.8.9 or later, which contains fixes for the SQL injection vulnerability by implementing proper prepared statements and parameterized query handling in the donation_ids parameter processing. The fix is documented in WordPress.org plugin repository changeset 3382719 and visible in the trunk branch of the charitable plugin source code. WordPress administrators should apply the update through the WordPress admin dashboard (Plugins > Updates) or via command line tools like WP-CLI. Until patching is possible, restrict user registration to trusted administrators, disable public donation functionality, or implement Web Application Firewall rules to block malformed donation_ids parameters containing SQL syntax. Refer to the Wordfence threat advisory (https://www.wordfence.com/threat-intel/vulnerabilities/id/46b7820c-f36d-4c7d-b326-07259786fc6a) for additional security context.

Priority Score

32
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +32
POC: 0

Share

CVE-2025-11893 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy