The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to unauthorized access and deletion of data due to a missing capability check on the 'handle_request' function in all versions up to, and including, 3.14.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read attachment paths and delete attachment files.
References
Configurations
History
26 Aug 2024, 18:14
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:* | |
References | () https://plugins.trac.wordpress.org/browser/give/tags/3.12.0/src/DonorDashboards/Tabs/EditProfileTab/AvatarRoute.php#L36 - Patch | |
References | () https://plugins.trac.wordpress.org/changeset/3132247/ - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/824ec2ba-b701-46e9-b237-53cd7d0e46da?source=cve - Third Party Advisory | |
First Time |
Givewp
Givewp givewp |
20 Aug 2024, 15:44
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
20 Aug 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-20 02:15
Updated : 2024-08-26 18:14
NVD link : CVE-2024-5941
Mitre link : CVE-2024-5941
CVE.ORG link : CVE-2024-5941
JSON object : View
Products Affected
givewp
- givewp
CWE
CWE-862
Missing Authorization