CVE-2025-11893
BaseFortify
Publication date: 2025-10-25
Last updated on: 2026-04-08
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordpres | charitable | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-89 | The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an SQL Injection in the Charitable β Donation Plugin for WordPress, specifically via the donation_ids parameter in versions up to and including 1.8.8.4. Due to insufficient escaping and lack of proper preparation of the SQL query involving this parameter, authenticated users with Subscriber-level access or higher who have made a paid donation can inject additional SQL queries. This allows them to manipulate the database queries to extract sensitive information from the database.
How can this vulnerability impact me? :
The vulnerability can allow an authenticated attacker with Subscriber-level access and a paid donation to perform SQL Injection attacks. This can lead to unauthorized extraction of sensitive information from the database, potentially compromising user data, donation records, and other confidential information stored by the plugin. The impact includes confidentiality, integrity, and availability risks as indicated by the CVSS score (8.8) with high impact on confidentiality, integrity, and availability.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to update the Charitable WordPress plugin to version 1.8.8.5 or later, which includes fixes to the SQL query handling and proper preparation to prevent SQL injection via the donation_ids parameter. This update modifies the core query class to use prepared statements and sanitization filters, effectively mitigating the vulnerability. [1, 2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this vulnerability involves identifying if the Charitable WordPress plugin version 1.8.8.4 or earlier is installed and if the donation_ids parameter is being used in requests. Since exploitation requires authenticated Subscriber-level access and a paid donation, monitoring for unusual SQL query patterns or unexpected database access related to donation_ids could help. However, no specific detection commands or network signatures are provided in the available resources.