GiveWP Plugin Vulnerability Risked 100,000+ Websites To RCE

Hey there, fellow WordPress users! Have you heard about the recent security scare surrounding the GiveWP plugin? It turns out there was a serious code execution vulnerability that put thousands of websites at risk. If you’re using this plugin, make sure to update to the latest version to stay safe.

GiveWP Plugin Vulnerability Exposed

In a detailed post by Wordfence, it was revealed that a critical code execution flaw was present in the GiveWP plugin. This popular plugin, designed for donations and fundraising, had a vulnerability that could be exploited by hackers. With over 100,000 active installations, the stakes were high for WordPress site owners.

The vulnerability, known as a PHP Object Injection issue, affected all versions of GiveWP up to v.3.14.1. It allowed attackers to inject malicious code through the ‘give_title’ parameter, enabling them to execute harmful actions like remote code execution or file deletion.

Rated as CVE-2024-5932 with a severity score of 10.0, this vulnerability posed a significant threat to websites if left unpatched.

Stay Protected – Update Now!

Thanks to the vigilance of security researcher Villu Orav, the GiveWP team swiftly released a patch with version 3.14.2. Villu’s responsible disclosure through Wordfence’s bug bounty program earned him a $4998 reward.

The latest version now available is 3.15.1, packed with security fixes and enhancements. Don’t wait – update your plugin to ensure your site is secure.

We’d love to hear your thoughts on this – drop us a comment below!

Leave a Reply

Your email address will not be published. Required fields are marked *