The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.14.1 via deserialization of untrusted input from the 'give_title' parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to execute code remotely, and to delete arbitrary files.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 20 Aug 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Givewp
Givewp givewp |
|
| CPEs | cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Givewp
Givewp givewp |
|
| Metrics |
ssvc
|
Tue, 20 Aug 2024 02:15:00 +0000
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-20T13:40:12.334Z
Reserved: 2024-06-12T20:03:22.687Z
Link: CVE-2024-5932
Updated: 2024-08-20T13:38:40.381Z
Status : Analyzed
Published: 2024-08-20T02:15:04.240
Modified: 2024-08-26T18:34:13.787
Link: CVE-2024-5932
No data.
OpenCVE Enrichment
No data.
Weaknesses