CVE-2024-30229

8.0 HIGH

📋 TL;DR

This CVE describes a PHP object injection vulnerability in the GiveWP WordPress plugin. Attackers can exploit insecure deserialization to execute arbitrary code on affected websites. All WordPress sites running GiveWP versions up to 3.4.2 are vulnerable.

💻 Affected Systems

Products:
  • GiveWP WordPress Plugin
Versions: n/a through 3.4.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with vulnerable GiveWP versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete site compromise, data theft, malware installation, and server takeover.

🟠

Likely Case

Arbitrary code execution allowing attackers to create admin users, modify content, steal sensitive data, or install backdoors.

🟢

If Mitigated

Limited impact if proper web application firewalls and input validation are in place, though risk remains significant.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation details are publicly available and relatively straightforward for attackers with basic PHP knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.4.3 or later

Vendor Advisory: https://wordpress.org/plugins/give/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find GiveWP and click 'Update Now'. 4. Verify update to version 3.4.3 or higher.

🔧 Temporary Workarounds

Disable GiveWP Plugin

all

Temporarily disable the vulnerable plugin until patching is possible.

wp plugin deactivate give

Web Application Firewall Rule

all

Block suspicious deserialization attempts at the WAF level.

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for all user inputs
  • Deploy web application firewall with rules to detect and block deserialization attacks

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → GiveWP version. If version is 3.4.2 or lower, you are vulnerable.

Check Version:

wp plugin list --name=give --field=version

Verify Fix Applied:

Verify GiveWP version is 3.4.3 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to GiveWP endpoints
  • PHP serialized data in request logs
  • Unexpected file creation or modification

Network Indicators:

  • HTTP requests containing serialized PHP objects
  • Suspicious traffic to /wp-content/plugins/give/ endpoints

SIEM Query:

source="web_logs" AND (uri="*give*" OR uri="*wp-content/plugins/give*") AND (request_body="*O:*" OR request_body="*C:*" OR request_body="*a:*")

🔗 References

📤 Share & Export