CVE-2024-9130

7.2 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers with GiveWP Manager-level access or higher to perform time-based SQL injection attacks via the 'order' parameter in Legacy View mode. Attackers can extract sensitive information from the database by appending malicious SQL queries. Only WordPress sites running vulnerable versions of the GiveWP plugin are affected.

💻 Affected Systems

Products:
  • GiveWP - Donation Plugin and Fundraising Platform for WordPress
Versions: All versions up to and including 3.16.1
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access with GiveWP Manager role or higher. Only exploitable in Legacy View mode.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including donor information, payment details, user credentials, and sensitive WordPress configuration data.

🟠

Likely Case

Extraction of donor personal information, donation amounts, and potentially other sensitive plugin data stored in the database.

🟢

If Mitigated

Limited impact if proper access controls restrict GiveWP Manager roles and database permissions are properly configured.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and knowledge of SQL injection techniques. Time-based attacks are detectable but effective.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.16.2 and later

Vendor Advisory: https://wordpress.org/plugins/give/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find GiveWP plugin. 4. Click 'Update Now' if available. 5. Alternatively, download version 3.16.2+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable Legacy View Mode

all

Disable the Legacy View mode in GiveWP settings to remove the vulnerable code path

Restrict GiveWP Manager Roles

all

Review and limit users with GiveWP Manager access to only trusted personnel

🧯 If You Can't Patch

  • Implement strict database user permissions with read-only access where possible
  • Enable WordPress security plugins with SQL injection detection and WAF capabilities

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → GiveWP version. If version is 3.16.1 or lower, you are vulnerable.

Check Version:

wp plugin list --name=give --field=version

Verify Fix Applied:

Verify GiveWP plugin version is 3.16.2 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple requests with 'order' parameter variations
  • Long-running database queries from WordPress users

Network Indicators:

  • Repeated POST requests to GiveWP admin endpoints with SQL-like parameters

SIEM Query:

source="wordpress.log" AND "order=" AND ("sleep" OR "benchmark" OR "waitfor")

🔗 References

📤 Share & Export