A critical security vulnerability
A critical security vulnerability has been identified in the GiveWP WordPress plugin, which affects over 100,000 websites. This flaw, tracked as CVE-2024-5932, has a maximum severity score of 10.0 on the CVSS scale. It exposes sites to potential remote code execution attacks. The vulnerability impacts all versions of the plugin prior to the release of version 3.14.2 on August 7, 2024.
Nature of the Vulnerability
The vulnerability arises from a PHP Object Injection issue through the deserialization of untrusted input from the ‘give_title’ parameter. According to Wordfence, a security firm that reported on the issue. This flaw allows unauthenticated attackers to inject a PHP object into the application. The presence of a “POP chain” (Property-Oriented Programming chain) further enables attackers. To execute arbitrary code remotely and delete files on the server.
The root of the problem lies in the give_process_donation_form()
function, which is responsible for validating and sanitizing form data before it is processed for donations, including payment details. If exploited, this vulnerability could allow malicious actors to execute harmful code on the server.
Recommended Actions
Given the severity of this vulnerability, it is crucial for users of the GiveWP plugin to update their installations to version 3.14.2 or later immediately. This update will mitigate the risk posed by the vulnerability and protect websites from potential exploitation.
Broader Context of WordPress Vulnerabilities
The disclosure of the GiveWP vulnerability comes amid a wave of security issues affecting various WordPress plugins. Recently, Wordfence also reported critical flaws in the InPost PL and InPost for WooCommerce plugins (CVE-2024-6500), which similarly allow unauthenticated users to read and delete sensitive files. Additionally, vulnerabilities in the JS Help Desk plugin (CVE-2024-7094) and others have been identified, highlighting the ongoing security challenges within the WordPress ecosystem.
Conclusion
Website owners must prioritize patching vulnerabilities to safeguard against potential attacks that could compromise sensitive data, such as credit card information. Security experts emphasize the importance of using legitimate plugins and themes, as pirated versions can introduce additional risks. Maintaining a proactive approach to website security is essential for protecting both the site and its users from malicious activities.