CVE-2024-5932
CRITICAL EXPLOITED NUCLEIGivewp < 3.14.2 - Insecure Deserialization
Title source: ruleDescription
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.14.1 via deserialization of untrusted input from the 'give_title' parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to execute code remotely, and to delete arbitrary files.
Exploits (8)
nomisec
WORKING POC
by nishant-kumar-5173 · remote
https://github.com/nishant-kumar-5173/CVE-2024-5932
metasploit
WORKING POC
EXCELLENT
by Villu Orav, EQSTLab, cuokon, Julien Ahrens, Valentin Lobstein · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_givewp_rce.rb
Nuclei Templates (1)
GiveWP - PHP Object Injection
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Scores
CVSS v3
10.0
EPSS
0.9417
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Details
VulnCheck KEV
2025-03-19
CWE
CWE-502
Status
published
Products (2)
givewp/givewp
< 3.14.2
stellarwp/GiveWP – Donation Plugin and Fundraising Platform
< 3.14.1
Published
Aug 20, 2024
Tracked Since
Feb 18, 2026