Stored Cross-Site Scripting in Raisely Donation Form Plugin for WordPress
CVE-2025-3781

6.4MEDIUM

Key Information:

Vendor

WordPress

Vendor
CVE Published:
21 May 2025

What is CVE-2025-3781?

The Raisely Donation Form plugin for WordPress allows for Stored Cross-Site Scripting (XSS) due to inadequate input sanitization and output escaping on user-supplied attributes used in the raisely_donation_form shortcode. This vulnerability affects all versions up to and including 1.0, enabling authenticated attackers with contributor-level permissions or higher to inject arbitrary scripts. The malicious scripts execute when affected pages are accessed, posing a risk to users of the website.

Affected Version(s)

Raisely Donation Form * <= 1.0

References

CVSS V3.1

Score:
6.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Peter Thaleikis
.