You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/exploits/multi/http/wp_givewp_rce.rb
+1-6Lines changed: 1 addition & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -16,12 +16,7 @@ def initialize(info = {})
16
16
info,
17
17
'Name'=>'GiveWP Unauthenticated Donation Process Exploit',
18
18
'Description'=>%q{
19
-
The GiveWP Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to a PHP Object Injection (POI) attack.
20
-
This vulnerability exists in all versions up to and including 3.14.1 due to improper handling of untrusted input in the 'give_title' parameter.
21
-
The flaw allows unauthenticated attackers to inject a PHP object via the deserialization of this parameter.
22
-
Exploiting this vulnerability can lead to arbitrary code execution, as the PHP Object Injection is leveraged to trigger a chain of property-oriented programming (POP) that facilitates remote code execution (RCE).
23
-
Additionally, the attacker may gain the ability to delete arbitrary files on the affected server.
24
-
This module interacts with the vulnerable endpoint by exploiting this weakness to execute arbitrary code on the server, potentially leading to full server compromise.
19
+
The GiveWP Donation Plugin and Fundraising Platform plugin for WordPress in all versions up to and including 3.14.1 is vulnerable to a PHP Object Injection (POI) attack granting an unauthenticated arbitrary code execution.
0 commit comments