Impact
The GiveWP Donations Widget plugin is vulnerable to PHP Object Injection through the untrusted 'card_address' parameter in the donation form. By sending crafted data, an unauthenticated attacker can deserialize malicious objects. The presence of a PHP Object Profiler (POP) chain allows the attacker to execute arbitrary code on the affected WordPress site, providing full control over confidentiality, integrity, and availability of the system.
Affected Systems
GiveWP – Donation Plugin and Fundraising Platform versions 3.19.4 and earlier are affected. These versions process the 'card_address' parameter without proper validation, leading to the injection vulnerability.
Risk and Exploitability
The CVSS score of 9.8 indicates critical severity, and the EPSS score of 2% suggests a non‑negligible probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers can reach the vulnerable endpoint via the public donations form, so the attack vector is likely unauthenticated web input.
OpenCVE Enrichment
EUVD