CVE-2024-9634
GiveWP – Donation Plugin and Fundraising Platform <= 3.16.3 - Unauthenticated PHP Object Injection to Remote Code Execution
CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.16.3 via deserialization of untrusted input from the give_company_name parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to achieve remote code execution.
| CWE | CWE-502 |
| Vendor | stellarwp |
| Product | givewp – donation plugin and fundraising platform |
| Published | Oct 16, 2024 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for stellarwp givewp – donation plugin and fundraising platform
Be the first to know when new critical vulnerabilities affecting stellarwp givewp – donation plugin and fundraising platform are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
stellarwp / GiveWP – Donation Plugin and Fundraising Platform
0 ≤ 3.16.3
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/b8eb3aa9-fe60-48b6-aa24-7873dd68b47e?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/give/tags/3.16.2/src/Donations/Repositories/DonationRepository.php?rev=3157829 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/3166836/give/tags/3.16.4/includes/process-donation.php
Credits
fabrice perez