Vulnerability Description
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.16.3 via deserialization of untrusted input from the give_company_name parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to achieve remote code execution.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Givewp | Givewp | < 3.16.4 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/give/tags/3.16.2/src/Donations/ReposiProduct
- https://plugins.trac.wordpress.org/changeset/3166836/give/tags/3.16.4/includes/pPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/b8eb3aa9-fe60-48b6-aa2Third Party Advisory
FAQ
What is CVE-2024-9634?
CVE-2024-9634 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.16.3 via deserialization of untrusted input fro...
How severe is CVE-2024-9634?
CVE-2024-9634 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-9634?
Check the references section above for vendor advisories and patch information. Affected products include: Givewp Givewp.