Vulnerability Description
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.14.1 via deserialization of untrusted input from the 'give_title' parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to execute code remotely, and to delete arbitrary files.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Givewp | Givewp | < 3.14.2 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/give/tags/3.12.0/includes/login-regisPatch
- https://plugins.trac.wordpress.org/browser/give/tags/3.12.0/includes/process-donPatch
- https://plugins.trac.wordpress.org/browser/give/tags/3.12.0/src/DonorDashboards/Patch
- https://plugins.trac.wordpress.org/browser/give/tags/3.12.0/vendor/tecnickcom/tcPatch
- https://plugins.trac.wordpress.org/browser/give/tags/3.12.0/vendor/vendor-prefixPatch
- https://plugins.trac.wordpress.org/changeset/3132247/Patch
- https://www.wordfence.com/blog/2024/08/4998-bounty-awarded-and-100000-wordpress-Third Party Advisory
- https://www.wordfence.com/threat-intel/vulnerabilities/id/93e2d007-8157-42c5-92aThird Party Advisory
FAQ
What is CVE-2024-5932?
CVE-2024-5932 is a vulnerability with a CVSS score of 10.0 (CRITICAL). The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.14.1 via deserialization of untrusted input fro...
How severe is CVE-2024-5932?
CVE-2024-5932 has been rated CRITICAL with a CVSS base score of 10.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-5932?
Check the references section above for vendor advisories and patch information. Affected products include: Givewp Givewp.