Description
Deserialization of Untrusted Data vulnerability in StellarWP GiveWP give allows Object Injection.This issue affects GiveWP: from n/a through <= 3.19.3.
Published: 2025-01-13
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The GiveWP plugin in WordPress has a deserialization weakness that allows a malicious actor to inject PHP objects. When untrusted data is deserialized without validation, an attacker can craft a payload that causes the plugin to instantiate arbitrary PHP objects, potentially leading to code execution, data tampering, or the compromise of the entire WordPress site. This flaw is a classic example of the CWE-502 weakness, where an application blindly trusts external data while performing deserialization.

Affected Systems

WordPress sites running the StellarWP GiveWP plugin version 3.19.3 or earlier are vulnerable. The specific affected product is GiveWP, used in WordPress installations that require donation handling. No further vendor or version filters are listed, so any installation of these plugin versions is considered at risk.

Risk and Exploitability

The CVSS score of 9.8 classifies this as critical, indicating a high degree of impact. The EPSS score is reported as less than 1 percent, suggesting that exploitation is not widely observed yet, but the severity remains high. The vulnerability is not listed in the CISA KEV catalog, so there is no publicly documented exploit at the time of this analysis. The likely attack vector is remote via a crafted serialized payload submitted through any exposed user input or API that the plugin processes. An attacker can thus gain full control of the affected WordPress environment if the plugin deserializes the data without proper safeguards.

Generated by OpenCVE AI on May 1, 2026 at 21:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade GiveWP to the latest version (3.19.4 or newer) which removes the vulnerable deserialization logic.
  • If an immediate upgrade is not feasible, temporarily disable the GiveWP plugin to eliminate the attack surface until a patch becomes available.
  • Implement strict input validation and deserialization whitelisting, ensuring that only trusted classes are instantiated and untrusted data is never processed by the plugin.

Generated by OpenCVE AI on May 1, 2026 at 21:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-2987 Deserialization of Untrusted Data vulnerability in GiveWP GiveWP allows Object Injection.This issue affects GiveWP: from n/a through 3.19.3.
History

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in GiveWP GiveWP allows Object Injection.This issue affects GiveWP: from n/a through 3.19.3. Deserialization of Untrusted Data vulnerability in StellarWP GiveWP give allows Object Injection.This issue affects GiveWP: from n/a through <= 3.19.3.
References

Wed, 04 Jun 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Givewp
Givewp givewp
CPEs cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*
Vendors & Products Givewp
Givewp givewp

Mon, 13 Jan 2025 18:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Jan 2025 13:30:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in GiveWP GiveWP allows Object Injection.This issue affects GiveWP: from n/a through 3.19.3.
Title WordPress GiveWP Plugin <= 3.19.3 - PHP Object Injection vulnerability
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:07.158Z

Reserved: 2025-01-07T21:04:56.181Z

Link: CVE-2025-22777

cve-icon Vulnrichment

Updated: 2025-01-13T17:58:15.458Z

cve-icon NVD

Status : Modified

Published: 2025-01-13T14:15:12.900

Modified: 2026-04-23T15:23:35.750

Link: CVE-2025-22777

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T22:00:14Z

Weaknesses