CVE-2025-11893
MEDIUMCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Lifecycle Timeline
2Description
The Charitable - Donation Plugin for WordPress - Fundraising with Recurring Donations & More plugin for WordPress is vulnerable to SQL Injection via the donation_ids parameter in all versions up to, and including, 1.8.8.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Exploitation of the vulnerability requires a paid donation.
Analysis
SQL injection in the Charitable WordPress plugin versions up to 1.8.8.4 allows authenticated users with Subscriber-level access to extract sensitive database information via the donation_ids parameter due to insufficient escaping and lack of prepared statements. The vulnerability requires a paid donation to exploit and affects the donation query processing logic. No public exploit code or active exploitation has been confirmed at the time of analysis, though the flaw is straightforward to weaponize given the low attack complexity and documented vulnerable code path.
Technical Context
The vulnerability exists in the abstract-class-charitable-query.php file where the donation_ids parameter is incorporated into SQL queries without proper escaping or parameterized query preparation. CWE-89 (SQL Injection) is the root cause, stemming from direct concatenation of user-supplied input into database queries. The affected plugin is a WordPress donation and fundraising system that processes financial transactions; the vulnerable code path handles donation query filtering and retrieval. While the CVSS vector indicates PR:L (Subscriber-level privilege required), the execution context within WordPress means this credential threshold is relatively low compared to typical application roles. The CPE for the affected product is wp:plugin:charitable, affecting all versions through 1.8.8.4.
Affected Products
The Charitable WordPress plugin is vulnerable in all versions up to and including 1.8.8.4. The plugin is distributed through the WordPress.org plugin repository and identified by CPE wp:plugin:charitable. Affected installations include any WordPress site running this plugin with user registration enabled and the vulnerable code path active in donation processing workflows.
Remediation
Update the Charitable plugin to version 1.8.9 or later, which contains fixes for the SQL injection vulnerability by implementing proper prepared statements and parameterized query handling in the donation_ids parameter processing. The fix is documented in WordPress.org plugin repository changeset 3382719 and visible in the trunk branch of the charitable plugin source code. WordPress administrators should apply the update through the WordPress admin dashboard (Plugins > Updates) or via command line tools like WP-CLI. Until patching is possible, restrict user registration to trusted administrators, disable public donation functionality, or implement Web Application Firewall rules to block malformed donation_ids parameters containing SQL syntax. Refer to the Wordfence threat advisory (https://www.wordfence.com/threat-intel/vulnerabilities/id/46b7820c-f36d-4c7d-b326-07259786fc6a) for additional security context.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today