First published: Sat Jan 11 2025(Updated: )
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.19.2 via deserialization of untrusted input from the donation form like 'firstName'. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files on the server that makes remote code execution possible. Please note this was only partially patched in 3.19.3, a fully sufficient patch was not released until 3.19.4. However, another CVE was assigned by another CNA for version 3.19.3 so we will leave this as affecting 3.19.2 and before. We have recommended the vendor use JSON encoding to prevent any further deserialization vulnerabilities from being present.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Givenu Givenu Give | <=3.19.2 | |
GiveWP | <=3.19.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12877 is classified as a high severity vulnerability due to its potential for exploitation through PHP Object Injection.
To fix CVE-2024-12877, update the GiveWP Donation Plugin to version 3.19.3 or later.
CVE-2024-12877 affects all versions of the GiveWP Donation Plugin up to and including 3.19.2.
The impact of CVE-2024-12877 allows unauthenticated attackers to execute arbitrary PHP code through object injection.
There is no specific workaround for CVE-2024-12877; the only solution is to update the plugin to the latest version.