Untrusted Input Vulnerability in GiveWP Donation Plugin Allows PHP Object Injection and Remote Code Execution
CVE-2024-9634
9.8CRITICAL
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 16 October 2024
Summary
The GiveWP Donation Plugin for WordPress is impacted by a significant security issue involving PHP Object Injection. This vulnerability arises from the deserialization of untrusted input, specifically through the give_company_name parameter. Attackers exploiting this vulnerability can inject a PHP Object into the application, with the potential for a crafted payload to execute remote code. This poses a severe threat to the integrity and confidentiality of the affected WordPress installations. Users are advised to review their plugin versions and apply necessary updates to mitigate this risk.
Affected Version(s)
GiveWP – Donation Plugin and Fundraising Platform * <= 3.16.3
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
fabrice perez