The donation WordPress plugin through 1.0 does not sanitize and escape a parameter before using it in a SQL statement, allowing high privilege users, such as admin to perform SQL injection attacks
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 02 Dec 2025 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The donation WordPress plugin through 1.0 does not sanitize and escape a parameter before using it in a SQL statement, allowing high privilege users, such as admin to perform SQL injection attacks | |
| Title | Donation <= 1.0 - Admin+ SQLi | |
| References |
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-12-02T06:00:07.918Z
Reserved: 2025-11-11T12:44:18.243Z
Link: CVE-2025-13001
No data.
Status : Received
Published: 2025-12-02T06:15:45.543
Modified: 2025-12-02T06:15:45.543
Link: CVE-2025-13001
No data.
OpenCVE Enrichment
No data.