Critical WordPress Plugin RCE Vulnerability Impacts 100k+ Sites

by Esmeralda McKenzie
Critical WordPress Plugin RCE Vulnerability Impacts 100k+ Sites

Critical WordPress Plugin RCE Vulnerability Impacts 100k+ Sites

WordPress Plugin RCE Vulnerability

A extreme security flaw has been realized in GiveWP, a favored WordPress donation plugin with over 100,000 energetic installations.

The vulnerability, labeled as an unauthenticated PHP Object Injection leading to Distant Code Execution (RCE), became as soon as responsibly reported thru the Wordfence Malicious program Bounty Program on May per chance well well also merely twenty sixth, 2024.

The serious vulnerability, assigned CVE-2024-5932 with a CVSS fetch of 10.0, affects all versions of GiveWP up to and in conjunction with 3.14.1. It enables unauthenticated attackers to inject malicious PHP objects thru the ‘give_title’ parameter, doubtlessly leading to some distance off code execution and arbitrary file deletion.

Security researcher villu164 realized the flaw and earned a colossal bounty of $4,998.00 for the finding. The Wordfence crew promptly validated the document and attempted to contact the StellarWP crew, the plugin’s developers, on June 13th, 2024. After receiving no response, they escalated the arena to the WordPress.org Security Crew on July Sixth, 2024.

WordPress Plugin RCE Vulnerability

The vulnerability stems from wicked input sanitization within the donation construct processing characteristic. Attackers can exploit this flaw to inject serialized PHP objects, which are then unserialized at some stage in payment processing. A PHP POP chain fresh within the plugin enables for the execution of arbitrary code and file deletion.

google

StellarWP launched a patched model (3.14.2) addressing the vulnerability on August Seventh, 2024. WordPress remark administrators are strongly urged to update their GiveWP plugin to this latest model straight.

The severity of this vulnerability can’t be overstated, given its most likely for unauthorized some distance off code execution on affected internet sites. WordPress remark householders may perhaps per chance per chance additionally merely serene:

  1. At present update GiveWP to model 3.14.2 or later
  2. Habits an intensive security audit of their internet sites
  3. Steal into consideration enforcing extra security features, equivalent to Web Application Firewalls

Given the serious nature of the vulnerability and its most likely for some distance off code execution, it’s likely that malicious actors may perhaps per chance per chance additionally merely try to employ it rapidly within the occasion that they haven’t already. The disclosure recommends that WordPress remark administrators urgently update to the patched model 3.14.2 to mitigate the risk.

googlenews

Source credit : cybersecuritynews.com

Related Posts