Reflected Cross-Site Scripting Vulnerability in GiveWP WordPress Plugin
CVE-2024-11921

Currently unrated

Key Information:

Vendor
GiveWP
Status
GiveWP
Vendor
CVE Published:
27 December 2024

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC

Summary

The GiveWP WordPress plugin, prior to version 3.19.0, contains a vulnerability where it fails to properly sanitize and escape a user-supplied parameter before reflecting it back in the page output. This oversight can lead to a reflected cross-site scripting (XSS) attack, making it possible for attackers to execute malicious scripts in the context of high privilege users, such as administrators. Such an exploit could enable unauthorized access, data manipulation, or other malicious activities, emphasizing the need for users to update their installations promptly to mitigate this risk.

Affected Version(s)

GiveWP 0 < 3.19.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database1 Proof of Concept(s)

Credit

Hassan Khan Yusufzai - Splint3r7
WPScan
.