CVE-2024-5977
GiveWP – Donation Plugin and Fundraising Platform <= 3.13.0 - Insecure Direct Object Reference to Authenticated (GiveWP Worker+) Arbitrary Post Actions
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.13.0 via the 'handleRequest' function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with GiveWP Worker-level access and above, to delete and update arbitrary posts.
El complemento GiveWP – Donation Plugin and Fundraising Platform para WordPress es vulnerable a la referencia directa de objetos inseguros en todas las versiones hasta la 3.13.0 incluida a través de la función 'handleRequest' debido a la falta de validación en una clave controlada por el usuario. Esto hace posible que los atacantes autenticados, con acceso de nivel de trabajador de GiveWP y superior, eliminen y actualicen publicaciones arbitrarias.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-06-13 CVE Reserved
- 2024-07-18 CVE Published
- 2024-07-20 EPSS Updated
- 2024-08-01 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-639: Authorization Bypass Through User-Controlled Key
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://www.wordfence.com/threat-intel/vulnerabilities/id/2dca6c29-9f05-4d82-90e3-834f1dd8005a?source=cve | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://plugins.trac.wordpress.org/browser/give/trunk/src/DonationForms/V2/Endpoints/FormActions.php#L96 | 2024-07-19 | |
https://plugins.trac.wordpress.org/changeset/3120745 | 2024-07-19 |
URL | Date | SRC |
---|