CVE-2024-5932 - Deserialization of untrusted data
CVE Information
Original CVE data
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.14.1 via deserialization of untrusted input from the 'give_title' parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to execute code remotely, and to delete arbitrary files.
Givewp - (1)
Basic Analysis
Common vulnerability metrics
Deserialization of untrusted data
Vulnerability weakness type is in the top 25 CWEs according to MITRE. View Mitre Top 25 CWEs
Exploits are available either through exploit packs, Github repos or the world wide web in general.
Vulnerability is not in CISA's Known Exploited Vulnerabilities (KEV) catalog. See the KEV Catalog
-
No sightings of the vulnerability within threat reports.
Cybersecurity Frameworks
How the vulnerability maps against various cybersecurity frameworks
Compliance Impact
How the submited vulnerability affects compliance
Web Application Security Frameworks
Applicable if the issue likely affects a web application