First published: Tue Aug 20 2024(Updated: )
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'setup_wizard' function in all versions up to, and including, 3.13.0. This makes it possible for unauthenticated attackers to read the setup wizard administrative pages.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Givenu Givenu Give | <3.14.0 |
https://plugins.trac.wordpress.org/browser/give/tags/3.12.0/src/Onboarding/Wizard/Page.php#L78
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5939 is considered a significant vulnerability due to unauthorized data access resulting from a missing capability check.
To fix CVE-2024-5939, update the GiveWP – Donation Plugin and Fundraising Platform to version 3.14.0 or higher.
CVE-2024-5939 affects all versions of the GiveWP plugin up to and including version 3.13.0.
CVE-2024-5939 is a vulnerability that allows unauthorized access to sensitive data within the GiveWP plugin.
CVE-2024-5939 primarily affects users of the GiveWP – Donation Plugin and Fundraising Platform on WordPress.