Untrusted Input Vulnerability in GiveWP Donation Plugin Allows PHP Object Injection and Remote Code Execution
CVE-2024-9634

9.8CRITICAL

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
16 October 2024

Summary

The GiveWP Donation Plugin for WordPress is impacted by a significant security issue involving PHP Object Injection. This vulnerability arises from the deserialization of untrusted input, specifically through the give_company_name parameter. Attackers exploiting this vulnerability can inject a PHP Object into the application, with the potential for a crafted payload to execute remote code. This poses a severe threat to the integrity and confidentiality of the affected WordPress installations. Users are advised to review their plugin versions and apply necessary updates to mitigate this risk.

Affected Version(s)

GiveWP – Donation Plugin and Fundraising Platform * <= 3.16.3

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

fabrice perez
.