SQL Injection Vulnerability in GiveWP's Donation Plugin
CVE-2024-9130

7.2HIGH

Key Information:

Vendor
Webdevmattcrom
Status
GiveWP – Donation Plugin And Fundraising Platform
Vendor
CVE Published:
27 September 2024

Summary

The GiveWP Donation Plugin for WordPress is exposed to a time-based SQL Injection vulnerability via the 'order' parameter in all versions up to and including 3.16.1. This vulnerability arises from insufficient data escaping and lack of proper preparation in existing SQL queries, enabling authenticated users with Manager-level access and above to inject additional malicious SQL commands. These actions can result in unauthorized access to sensitive information stored in the database, particularly in Legacy View mode, potentially jeopardizing user data and the integrity of the application.

Affected Version(s)

GiveWP – Donation Plugin and Fundraising Platform * <= 3.16.1

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Leo Trinh
.