First published: Tue Aug 20 2024(Updated: )
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.14.1 via deserialization of untrusted input from the 'give_title' parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to execute code remotely, and to delete arbitrary files.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Givenu Givenu Give | <3.14.2 |
https://plugins.trac.wordpress.org/browser/give/tags/3.12.0/includes/process-donation.php#L420
https://plugins.trac.wordpress.org/browser/give/tags/3.12.0/vendor/tecnickcom/tcpdf/tcpdf.php#L7861
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5932 has critical severity due to its potential for PHP Object Injection, allowing unauthenticated attackers to exploit it.
To fix CVE-2024-5932, update the GiveWP plugin to version 3.14.2 or later.
All versions of the GiveWP plugin up to and including 3.14.1 are affected by CVE-2024-5932.
Yes, unauthenticated attackers can exploit CVE-2024-5932 due to PHP Object Injection vulnerabilities.
The impact of CVE-2024-5932 on WordPress sites includes potential arbitrary code execution, leading to full site compromise.