The vulnerability, scoring a maximum CVSS 9.8 (Critical) severity rating, originates from improper handling of user-supplied data in the plugin’s donation form processing logic.
Exploiting this flaw allows attackers to inject malicious PHP objects via deserialization of untrusted input, leveraging a POP (Property-Oriented Programming) chain to achieve full server compromise.
The vulnerability resides in the plugin’s handling of the card_address parameter within donation forms.
Versions up to and including 3.19.4 fail to validate or sanitize serialized data passed through this field, enabling PHP Object Injection (CWE-502).
During donation processing, the give_process_donation_form() function deserializes user input without proper checks, allowing attackers to craft payloads that instantiate arbitrary PHP objects.
A critical factor enabling RCE is the presence of exploitable POP chains in the plugin’s codebase. These chains allow attackers to string together gadget methods such as destructors or wakeup functions to escalate object injection into system command execution, reads Wordfence report.
This flaw bypasses WordPress’s security nonces and requires no authentication, making it accessible to any external attacker. Successful exploitation enables:
With GiveWP powering donation systems for nonprofits, religious organizations, and political campaigns, compromised sites risk financial fraud, donor data theft, and reputational damage.
Attackers could deface websites, redirect donations, or deploy cryptocurrency miners. The plugin’s integration with payment gateways like PayPal and Stripe raises concerns about secondary breaches of transactional systems.
Security analysts at Defiant warn that over 30% of affected sites remain unpatched despite the availability of version 3.20.0, which fixes the issue by implementing strict input validation and removing unsafe deserialization.
Website administrators must:
For sites unable to patch immediately, temporary mitigation involves disabling the donations widget or restricting form submissions to reCAPTCHA-verified users.
While no active exploits have been observed yet, the vulnerability’s simplicity and high impact make it a prime target for ransomware groups.
WordPress security teams urge organizations using GiveWP to subscribe to vulnerability disclosure feeds and implement atomic security measures like MalCare’s real-time exploit prevention.
With over 43% of all websites running WordPress, this vulnerability underscores the critical need for rigorous third-party plugin audits and automated patch management in nonprofit web infrastructures.
Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free
The post WordPress Plugin Vulnerability Exposes 10,000 Sites to Code Execution Attacks appeared first on Cyber Security News.
Cybersecurity researchers have uncovered several malware campaigns targeting gamers who search for free game cheats…
Warner selectman Michael Smith was charged with tampering with public records after he replaced a…
A group of taxpayers who sued the state in 2022, challenging its school funding system,…
A Merrimack Superior Court judge denied bail Wednesday for a therapist accused of sexually assaulting…
Nine of the 10 highest-paid state employees work in New Hampshire prisons. Last year, those…
FREEPORT, Ill. (WTVO) — The city of Freeport is in the process of demolishing One…
This website uses cookies.