WP Attractive Donations System – Easy Stripe & Paypal donations Vul…

WP Attractive Donations System – Easy Stripe & Paypal donations Vul…

by | Mar 5, 2026 | Plugins

Attack Vectors

The vulnerability in WP Attractive Donations System – Easy Stripe & Paypal donations (versions up to and including 1.25) is a High-severity, unauthenticated SQL Injection (CVE-2026-28115, CVSS 7.5). “Unauthenticated” means an attacker may not need a username or password to attempt exploitation over the internet.

For marketing and business leaders, the key risk is simple: if your public-facing website uses this plugin, an attacker could attempt to query your site’s database remotely and extract sensitive information. This can occur without visible disruption, making early detection difficult.

Security Weakness

According to the published advisory, the plugin is vulnerable due to insufficient escaping of a user-supplied parameter and insufficient preparation of an existing SQL query. In practical terms, this can allow an attacker to alter a database query in ways the site owner did not intend.

There is no known patch available at this time. The remediation guidance recommends reviewing the issue in depth and applying mitigations based on your organization’s risk tolerance; in many cases, the safest business decision is to uninstall the affected software and replace it.

Technical or Business Impacts

This issue is associated with a high confidentiality impact (CVSS vector indicates C:H). That can translate into real business outcomes such as exposure of customer/contact data, donor information stored in WordPress, internal user records, or other sensitive site data held in the database.

Beyond immediate data exposure, the business impacts often include brand and campaign damage (loss of trust during fundraising or lead-generation efforts), potential regulatory and contractual consequences (privacy obligations, reporting requirements, and vendor/client notifications), and unplanned costs for incident response, legal review, and communications.

Recommended actions: identify whether the plugin is installed and at-risk (≤ 1.25), consider uninstalling and replacing it given the lack of a patch, and implement compensating controls such as tightening access where possible, monitoring logs for unusual request patterns, and ensuring backups and incident response contacts are current.

Reference: CVE-2026-28115 and the advisory source at Wordfence Threat Intelligence.

Similar Attacks

SQL Injection has a long track record of causing material business harm when internet-facing applications are exposed. Examples include:

TalkTalk (2015) breach, widely reported as involving SQL injection techniques and resulting in significant financial and reputational impact.

Heartland Payment Systems (2008) incident, a major payment-card compromise that illustrates how database-focused attacks can scale into large compliance and response costs.

Magento “Shoplift” era attacks (2015), which highlighted how injection-style vulnerabilities in e-commerce platforms can lead to large-scale data theft and downstream fraud.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers