Description
Cross-Site Request Forgery (CSRF) vulnerability in loopus WP Attractive Donations System - Easy Stripe & Paypal donations WP_AttractiveDonationsSystem allows Cross Site Request Forgery.This issue affects WP Attractive Donations System - Easy Stripe & Paypal donations: from n/a through <= 1.25.
Published: 2025-12-16
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The WP Attractive Donations System plugin contains a CSRF flaw that allows an attacker to force an authenticated WordPress user to submit unintended requests on the site. This can lead to unauthorized financial transactions, unauthorized changes to donation settings, or other actions that the plugin exposes. The flaw is classified as CWE‑352 and therefore faces the risk of a compromised user session being abused without the user's knowledge.

Affected Systems

All releases of Loopus’ WP Attractive Donations System – Easy Stripe & Paypal donations up to and including version 1.25 are affected; no specific sub‑version list or mitigation patch is listed for the earlier releases, meaning every deployment of the plugin in that version range is vulnerable.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate severity. The EPSS score is less than 1 %, suggesting a low likelihood of exploitation. Based on the description, it is inferred that the likely attack vector is cross‑site request forgery that relies on the victim being logged into the WordPress site; the attacker can exploit the plugin’s lack of nonce validation to trigger desired actions such as fraudulent donations or configuration changes. The vulnerability is not listed in the CISA KEV catalog.

Generated by OpenCVE AI on April 29, 2026 at 15:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the WP Attractive Donations System plugin to the latest release that has removed the CSRF flaw; vendors recommend upgrading beyond version 1.25.
  • If an immediate update is not possible, configure WordPress to send the authentication cookie with the SameSite attribute set to “Strict” or “Lax” to mitigate CSRF attacks on the site.
  • Add a CSRF nonce or token to any form that changes donation configuration or processes payments, and validate it on the server side using WordPress’ built‑in wp_nonce_* functions.
  • Deploy a web‑application firewall rule that detects and blocks repeated or suspicious POST requests lacking a valid WordPress nonce to reduce the surface for CSRF exploitation.

Generated by OpenCVE AI on April 29, 2026 at 15:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Tue, 16 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 16 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Tue, 16 Dec 2025 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Loopus
Loopus wp Attractive Donations System
Wordpress
Wordpress wordpress
Vendors & Products Loopus
Loopus wp Attractive Donations System
Wordpress
Wordpress wordpress

Tue, 16 Dec 2025 08:30:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in loopus WP Attractive Donations System - Easy Stripe & Paypal donations WP_AttractiveDonationsSystem allows Cross Site Request Forgery.This issue affects WP Attractive Donations System - Easy Stripe & Paypal donations: from n/a through <= 1.25.
Title WordPress WP Attractive Donations System - Easy Stripe & Paypal donations plugin <= 1.25 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References

Subscriptions

Loopus Wp Attractive Donations System
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T20:17:28.428Z

Reserved: 2025-09-06T04:45:29.150Z

Link: CVE-2025-58999

cve-icon Vulnrichment

Updated: 2025-12-16T20:18:15.162Z

cve-icon NVD

Status : Deferred

Published: 2025-12-16T09:15:52.700

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-58999

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T16:00:06Z

Weaknesses