CVE-2023-41665

8.8 HIGH

📋 TL;DR

CVE-2023-41665 is an improper privilege management vulnerability in the GiveWP WordPress plugin that allows authenticated attackers with GiveWP Manager role to escalate privileges to administrator. This affects all WordPress sites running GiveWP versions up to 2.33.0.

💻 Affected Systems

Products:
  • GiveWP WordPress Plugin
Versions: n/a through 2.33.0
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with GiveWP plugin enabled and at least one user with GiveWP Manager role.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control over WordPress site, allowing them to install malicious plugins/themes, modify content, steal sensitive data, or establish persistent backdoors.

🟠

Likely Case

Unauthorized users with GiveWP Manager role elevate to administrator and compromise the WordPress installation, potentially leading to data theft or site defacement.

🟢

If Mitigated

With proper role-based access controls and monitoring, impact is limited to unauthorized privilege changes that can be detected and reversed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with GiveWP Manager role. Public exploit details available in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.33.1

Vendor Advisory: https://wordpress.org/plugins/give/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find GiveWP and click 'Update Now'. 4. Verify update to version 2.33.1 or later.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable GiveWP plugin until patched version can be installed

wp plugin deactivate give

Role Restriction

all

Remove GiveWP Manager role from all users except trusted administrators

wp user list --role=give_manager
wp user set-role <user_id> subscriber

🧯 If You Can't Patch

  • Remove GiveWP Manager role from all non-administrator users
  • Implement strict monitoring of user role changes and admin activity logs

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → GiveWP version. If version is 2.33.0 or earlier, system is vulnerable.

Check Version:

wp plugin list --name=give --field=version

Verify Fix Applied:

Verify GiveWP plugin version is 2.33.1 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected user role changes from give_manager to administrator
  • Multiple failed privilege escalation attempts in WordPress logs

Network Indicators:

  • Unusual admin panel access from non-administrator IP addresses
  • Suspicious POST requests to user role modification endpoints

SIEM Query:

source="wordpress.log" AND ("user_role_changed" OR "set_role" OR "promote_user") AND ("give_manager" OR "administrator")

🔗 References

📤 Share & Export