{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-5932","assignerOrgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","state":"PUBLISHED","assignerShortName":"Wordfence","dateReserved":"2024-06-12T20:03:22.687Z","datePublished":"2024-08-20T02:03:16.108Z","dateUpdated":"2026-04-08T17:09:47.033Z"},"containers":{"cna":{"providerMetadata":{"orgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","shortName":"Wordfence","dateUpdated":"2026-04-08T17:09:47.033Z"},"affected":[{"vendor":"stellarwp","product":"GiveWP – Donation Plugin and Fundraising Platform","versions":[{"version":"0","status":"affected","lessThanOrEqual":"3.14.1","versionType":"semver"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.14.1 via deserialization of untrusted input from the 'give_title' parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to execute code remotely, and to delete arbitrary files."}],"title":"GiveWP – Donation Plugin and Fundraising Platform <= 3.14.1 - Unauthenticated PHP Object Injection to Remote Code Execution","references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/93e2d007-8157-42c5-92ad-704dc80749a3?source=cve"},{"url":"https://plugins.trac.wordpress.org/browser/give/tags/3.12.0/includes/login-register.php#L235"},{"url":"https://plugins.trac.wordpress.org/browser/give/tags/3.12.0/includes/process-donation.php#L420"},{"url":"https://plugins.trac.wordpress.org/browser/give/tags/3.12.0/vendor/vendor-prefixed/fakerphp/faker/src/Faker/ValidGenerator.php#L80"},{"url":"https://plugins.trac.wordpress.org/browser/give/tags/3.12.0/vendor/tecnickcom/tcpdf/tcpdf.php#L7861"},{"url":"https://plugins.trac.wordpress.org/browser/give/tags/3.12.0/src/DonorDashboards/Tabs/EditProfileTab/AvatarRoute.php#L51"},{"url":"https://plugins.trac.wordpress.org/changeset/3132247/"},{"url":"https://www.wordfence.com/blog/2024/08/4998-bounty-awarded-and-100000-wordpress-sites-protected-against-unauthenticated-remote-code-execution-vulnerability-patched-in-givewp-wordpress-plugin/"}],"problemTypes":[{"descriptions":[{"lang":"en","description":"CWE-502 Deserialization of Untrusted Data","cweId":"CWE-502","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":10,"baseSeverity":"CRITICAL"}}],"credits":[{"lang":"en","type":"finder","value":"Villu Orav"}],"timeline":[{"time":"2024-08-19T13:55:41.000Z","lang":"en","value":"Disclosed"}]},"adp":[{"affected":[{"vendor":"givewp","product":"givewp","cpes":["cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*"],"defaultStatus":"unaffected","versions":[{"version":"0","status":"affected","lessThanOrEqual":"3.14.1","versionType":"semver"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-20T13:40:06.546669Z","id":"CVE-2024-5932","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-20T13:40:12.334Z"}}]}}