CVE-2022-28700
📋 TL;DR
This vulnerability allows authenticated WordPress users with appropriate permissions to create arbitrary files on the server via the GiveWP plugin's export function. Attackers can potentially write malicious files like web shells, leading to remote code execution. It affects WordPress sites running GiveWP plugin version 2.20.2 and earlier.
💻 Affected Systems
- GiveWP WordPress Plugin
📦 What is this software?
Givewp by Givewp
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise via web shell deployment, data theft, defacement, or ransomware deployment.
Likely Case
Unauthorized file creation leading to web shell installation, privilege escalation, and lateral movement within the WordPress environment.
If Mitigated
Limited impact with proper file permission restrictions and monitoring, though file system integrity may still be compromised.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward once credentials are obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.20.3
Vendor Advisory: https://wordpress.org/plugins/give/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find GiveWP and click 'Update Now'. 4. Verify version is 2.20.3 or later.
🔧 Temporary Workarounds
Disable GiveWP Plugin
allTemporarily disable the vulnerable plugin until patching is possible.
wp plugin deactivate give
Restrict User Permissions
allLimit export functionality to trusted administrators only and review user roles.
🧯 If You Can't Patch
- Implement strict file system permissions to prevent PHP file execution in upload directories.
- Enable WordPress security plugins with file integrity monitoring and alerting.
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > GiveWP version. If version is 2.20.2 or lower, you are vulnerable.
Check Version:
wp plugin list --name=give --field=version
Verify Fix Applied:
Confirm GiveWP plugin version is 2.20.3 or higher in WordPress admin.
📡 Detection & Monitoring
Log Indicators:
- Unusual file creation events in WordPress uploads directory
- Multiple export requests from single user in short timeframe
- POST requests to /wp-admin/edit.php?post_type=give_forms&page=give-tools containing file creation parameters
Network Indicators:
- HTTP requests to GiveWP export endpoints with suspicious file parameters
SIEM Query:
source="wordpress.log" AND ("give-tools" OR "export") AND ("php" OR ".exe" OR suspicious_file_extension)
🔗 References
- https://patchstack.com/database/vulnerability/give/wordpress-givewp-plugin-2-20-2-authenticated-arbitrary-file-creation-via-export-function-vulnerability
- https://wordpress.org/plugins/give/#developers
- https://patchstack.com/database/vulnerability/give/wordpress-givewp-plugin-2-20-2-authenticated-arbitrary-file-creation-via-export-function-vulnerability
- https://wordpress.org/plugins/give/#developers