A maximum severity security flaw has been discovered in the GiveWP donation and fundraising WordPress plugin that exposes more than 100,000 websites to remote code execution attacks.
Tracked as CVE-2024-5932 (CVSS score: 10.0), the bug affects all versions of the plugin up to version 3.14.2, which was released on August 7, 2024. A security researcher with the alias villu164 has been credited with discovering and reporting the issue about her.
Plugin “vulnerable to PHP Object Injection in all versions up to and including 3.14.1 via deserialization of untrusted input from the ‘give_title’ parameter,” Wordfence said in this week’s report.
“This allows an unauthenticated attacker to root a PHP object. The additional presence of the POP chain allows attackers to execute code remotely and delete arbitrary files.”
The vulnerability is rooted in a function called “give_process_donation_form()”, which is used to validate and sanitize form input before passing the donation information, including payment details, to the specified gateway.
Successful exploitation of the flaw could allow an authenticated threat actor to execute malicious code on the server, making it imperative that users take steps to update their instances to the latest version.
The disclosure also comes days after Wordfence in detail another critical security flaw in InPost PL and InPost for WooCommerce WordPress plugins (CVE-2024-6500, CVSS Score: 10.0) that allows unauthenticated threat actors to read and delete arbitrary files, including the wp-config file. php.
On Linux systems, only files in the WordPress installation directory can be deleted, but all files can be read. The problem was fixed in version 1.4.5.
Another critical flaw in JS Help Desk, a WordPress plugin with over 5,000 active installations, was also discovered uncovered (CVE-2024-7094, CVSS Score: 9.8) as a remote code execution capability due to a PHP code injection flaw. A patch for this vulnerability was released in version 2.8.7.
Some of the other security flaws addressed in various WordPress plugins are listed below –
- CVE-2024-6220 (CVSS Score: 9.8) – Arbitrary file upload bug in the 简数旅行器 (Keydatas) plugin, which allows unauthenticated attackers to upload arbitrary files to a compromised site’s server, which eventually leads to code execution
- CVE-2024-6467 (CVSS Score: 8.8) – An arbitrary file read vulnerability in the BookingPress appointment booking plugin that allows authenticated attackers with subscriber-level access or higher to create arbitrary files and execute arbitrary code or access sensitive information
- CVE-2024-5441 (CVSS Score: 8.8) – Arbitrary file upload bug in the Modern Events Calendar plugin, which allows authenticated attackers with subscriber access and above to upload arbitrary files to the compromised site’s server and execute code
- CVE-2024-6411 (CVSS Score: 8.8) – Elevation of privilege bug in ProfileGrid, a user, group, and community profile plugin, that allows authenticated attackers with subscriber-level access or higher to upgrade their user’s capabilities to administrator capabilities.
Patching these vulnerabilities is a critical line of defense against attacks that use them to deliver credit card skimmers that are capable of collecting financial information entered by site visitors.
Last week, juices shed light in a skimmer company that injects malicious JavaScript into PrestaShop e-commerce websites that uses WebSocket connection to credit card theft.
The GoDaddy-owned website security company also warned WordPress site owners against installing nulled plugins and themes, saying they could act as vectors for malware and other nefarious activities.
“At the end of the day, keeping plugins and themes legal is a fundamental part of responsible website management, and security should never be compromised for the sake of speed,” Sukuri. said.