The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.16.1 via deserialization of untrusted input via several parameters like 'give_title' and 'card_address'. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files and achieve remote code execution. This is essentially the same vulnerability as CVE-2024-5932, however, it was discovered the the presence of stripslashes_deep on user_info allows the is_serialized check to be bypassed. This issue was mostly patched in 3.16.1, but further hardening was added in 3.16.2.
We have discovered 14,628 live websites that are affected by CVE-2024-8353.
Product | |
Category | Wordpress Plugins |
Vulnerable Domains | 14,628 live websites (40.12% of GiveWP install base) |
Vulnerable Versions |
|
Vulnerable Versions Count | 216 versions ( 91.14% of all versions) |
![]() | 7,561 websites |
![]() | 1,421 websites |
![]() | 762 websites |
![]() | 691 websites |
![]() | 409 websites |
![]() | 344 websites |
![]() | 283 websites |
![]() | 228 websites |
![]() | 207 websites |
![]() | 174 websites |
.org | 6,114 websites |
.com | 3,721 websites |
.de | 360 websites |
.it | 285 websites |
.net | 252 websites |
.ca | 237 websites |
.org.uk | 228 websites |
.fr | 213 websites |
.co.uk | 190 websites |
.nl | 126 websites |
Domain | Country | Rank | Contacts |
---|---|---|---|
*************.sk | ![]() | **,*** | |
****.info | ![]() | **,*** | |
*****.org | ![]() | **,*** | |
********.org | ![]() | **,*** | |
*********.org | ![]() | **,*** | |
************.org | ![]() | **,*** | |
****************.org | ![]() | **,*** | |
*******.org | ![]() | **,*** | |
**************.com | ![]() | **,*** | |
****.org | ![]() | **,*** |
FAQ