CVE-2024-37099

10.0 CRITICAL

📋 TL;DR

CVE-2024-37099 is an unauthenticated PHP object injection vulnerability in the GiveWP WordPress plugin. Attackers can exploit deserialization of untrusted data to execute arbitrary code on affected WordPress sites. All WordPress installations using GiveWP versions up to 3.14.1 are vulnerable.

💻 Affected Systems

Products:
  • WordPress GiveWP Plugin
Versions: n/a through 3.14.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with vulnerable GiveWP versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data theft, ransomware deployment, website defacement, and lateral movement to other systems.

🟠

Likely Case

Website takeover, backdoor installation, data exfiltration, and cryptocurrency mining malware deployment.

🟢

If Mitigated

Limited impact if proper web application firewalls and intrusion detection systems block exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code is available and requires no authentication, making this easily weaponizable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.14.2 and later

Vendor Advisory: https://wordpress.org/plugins/give/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find GiveWP and click 'Update Now'. 4. Verify version is 3.14.2 or higher.

🔧 Temporary Workarounds

Disable GiveWP Plugin

all

Temporarily disable the vulnerable plugin until patching is possible.

wp plugin deactivate give

Web Application Firewall Rule

all

Block malicious requests targeting the vulnerable endpoint.

# Add WAF rule to block requests containing suspicious deserialization patterns

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate WordPress servers
  • Deploy web application firewall with rules blocking PHP object injection patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → GiveWP version. If version is 3.14.1 or lower, system is vulnerable.

Check Version:

wp plugin list --name=give --field=version

Verify Fix Applied:

Verify GiveWP version is 3.14.2 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to GiveWP endpoints
  • PHP error logs containing unserialize() warnings
  • Web server logs showing exploitation patterns

Network Indicators:

  • HTTP requests containing serialized PHP objects
  • Traffic spikes to GiveWP plugin endpoints

SIEM Query:

source="web_logs" AND (uri_path="*give*" OR user_agent="*GiveWP*") AND (http_method="POST" AND size_bytes>1000)

🔗 References

📤 Share & Export