Article Details
Scrape Timestamp (UTC): 2025-08-01 16:15:54.102
Original Article Text
Click to Toggle View
Pi-hole discloses data breach via GiveWp WordPress plugin flaw. Pi-hole, a popular network-level ad-blocker, has disclosed that donor names and email addresses were exposed through a security vulnerability in the GiveWP WordPress donation plugin. Pi-hole acts as a DNS sinkhole, filtering out unwanted content before it reaches the users' devices. While initially designed to run on Raspberry Pi single-board computers, it now supports various Linux systems on dedicated hardware or virtual machines. The organization stated that they first learned of the incident on Monday, July 28, after donors began reporting that they were receiving suspicious emails at addresses used exclusively for donations. As explained in a Friday post-mortem, the breach affected users who donated through the Pi-hole website's donation form to support development, exposing personal information that was visible to anyone who viewed the webpage's source code due to a GiveWP security flaw. The vulnerability stemmed from GiveWP, a WordPress plugin used to process donations on the Pi-hole website. The plugin inadvertently made donor information publicly accessible without requiring authentication or special access privileges. While Pi-hole didn't disclose the number of affected customers, the 'Have I Been Pwned' data breach notification service added the Pi-hole breach, saying that it impacted almost 30,000 donors, with 73% of the exposed records already in its database. No financial information exposed Pi-hole added that no donor financial data was compromised, as credit card information and other payment details are handled directly by Stripe and PayPal. It also clarified that the Pi-hole software product itself was not affected in any way. "We make it clear in the donation form that we don't even require a valid name or email address, it's purely for users to see and manage their donations," Pi-hole said. "It is also important to note that Pi-hole the product is categorically not the subject of this breach. There is no action needed from users with a Pi-hole installed on their network." Although GiveWP released a patch within hours of the vulnerability being reported on GitHub, Pi-hole criticized the plugin developer's response, citing a 17.5-hour delay before notifying users and what it described as insufficient acknowledgment of the security flaw's potential impact on donor names and email addresses. Pi-hole apologized to affected donors and acknowledged potential reputation damage stemming from this security incident, saying that while the vulnerability was unforeseeable, they accept accountability for the resulting data breach. "The names and email addresses of anyone that had ever donated via our donation page was there for the entire world to see (provided they were savvy enough to right click->View page source). Within a couple of hours of this report, they had patched the bad code and released 4.6.1," Pi-hole added in a blog post analyzing the incident. "We take full responsibility for the software we deploy. We placed our trust in a widely-used plugin, and that trust was broken." Red Report 2025: Analyzing the Top ATT&CK Techniques Used by 93% of Malware Malware targeting password stores surged 3X as attackers executed stealthy Perfect Heist scenarios, infiltrating and exploiting critical systems. Discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.
Daily Brief Summary
Pi-hole, a network-level ad blocker, announced that a security flaw in the GiveWP WordPress plugin led to the exposure of donor names and email addresses.
The leak occurred through the donation form on Pi-hole's website, making personal donor data visible in the page’s source code without authentication.
The affected data did not include financial details as these are processed separately by Stripe and PayPal, and the Pi-hole software product was not compromised.
The data breach impacted nearly 30,000 donors, with information about the breach added to the 'Have I Been Pwned' notification service.
GiveWP responded to the security report by releasing a patch within hours, but Pi-hole criticized the delay and their initial handling of the issue.
Pi-hole has apologized to donors and acknowledged the potential damage to its reputation, stressing accountability although the vulnerability was unexpected.
Despite the patch, Pi-hole highlighted ongoing concerns over the plugin developer’s acknowledgment of the flaw's potential impact on donor privacy.