GiveWP – Donation Plugin and Fundraising Platform

Information

Software Type Plugin
Software Slug give (view on wordpress.org)
Software Status Active
Software Author webdevmattcrom
Software Website givewp.com
Software Downloads 8,182,361
Software Active Installs 100,000
Software Record Last Updated October 15, 2024

Showing 1-20 of 53 Vulnerabilities

Title Status CVE ID CVSS Researchers Date
GiveWP – Donation Plugin and Fundraising Platform <= 3.16.1 - Unauthenticated PHP Object Injection Patched CVE-2024-8353 10.0 cuokon September 27, 2024
GiveWP – Donation Plugin and Fundraising Platform <= 3.16.1 - Authenticated (GiveWP Manager+) SQL Injection via order Parameter Patched CVE-2024-9130 7.2 Leo September 26, 2024
GiveWP <= 3.15.1 - Cross-Site Request Forgery Patched CVE-2024-47315 4.3 Joshua Chan September 25, 2024
GiveWP <= 3.15.1 - Unauthenticated Full Path Disclosure Patched CVE-2024-6551 5.3 stealthcopter August 28, 2024
GiveWP – Donation Plugin and Fundraising Platform <= 3.14.1 - Unauthenticated PHP Object Injection to Remote Code Execution Patched CVE-2024-5932 10.0 villu164 August 19, 2024
GiveWP – Donation Plugin and Fundraising Platform <= 3.13.0 - Missing Authorization to Unauthenticated Event Settings Update Patched CVE-2024-5940 6.5 villu164 August 19, 2024
GiveWP – Donation Plugin and Fundraising Platform <= 3.13.0 - Missing Authorization to Limited Information Exposure Patched CVE-2024-5939 5.3 villu164 August 19, 2024
GiveWP – Donation Plugin and Fundraising Platform <= 3.14.1 - Missing Authorization to Authenticated (Subscriber+) Limited File Deletion Patched CVE-2024-5941 5.4 villu164 August 19, 2024
GiveWP – Donation Plugin and Fundraising Platform <= 3.13.0 - Insecure Direct Object Reference to Authenticated (GiveWP Worker+) Arbitrary Post Actions Patched CVE-2024-5977 5.4 Thanh Nam Tran July 18, 2024
GiveWP – Donation Plugin and Fundraising Platform <= 3.12.0 - Reflected Cross-Site Scripting Patched CVE-2024-35679 6.1 Dimas Maulana June 6, 2024
GiveWP – Donation Plugin and Fundraising Platform <= 3.10.0 - Authenticated (Contributor+) Stored Cross-Site Scripting Patched CVE-2024-3714 6.4 Ngô Thiên An (ancorn_) May 17, 2024
GiveWP – Donation Plugin and Fundraising Platform <= 3.4.2 - Authenticated (GiveWP Manager+) PHP Object Injection Patched CVE-2024-30229 8.8 Rafie Muhammad April 26, 2024
GiveWP – Donation Plugin and Fundraising Platform <= 3.6.1 -- Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode Patched CVE-2024-1957 6.4 Ngô Thiên An (ancorn_) April 12, 2024
GiveWP – Donation Plugin and Fundraising Platform <= 3.5.1 - Authenticated (Contributor+) Stored Cross-Site Scripting Patched CVE-2024-1424 6.4 Bassem Essam March 19, 2024
GiveWP <= 3.3.1 - Reflected Cross-Site Scripting Patched CVE-2024-27987 6.1 Rafie Muhammad March 15, 2024
GiveWP <= 3.2.2 - Authenticated (Contributor+) Stored Cross-Site Scripting Patched CVE-2023-51415 6.4 LVT-tholv2k January 19, 2024
GiveWP <= 2.33.3 - Cross-Site Request Forgery to Stripe Integration Deletion Patched CVE-2023-4248 5.4 Marco Wotschka October 31, 2023
GiveWP <= 2.33.3 - Cross-Site Request Forgery to plugin installation Patched CVE-2023-4246 4.3 Marco Wotschka October 31, 2023
GiveWP <= 2.33.3 - Cross-Site Request Forgery to plugin deactivation Patched CVE-2023-4247 5.4 Marco Wotschka October 31, 2023
GiveWP <= 2.33.1 - Missing Authorization via handleBeforeGateway Patched CVE-2023-47183 5.3 Revan Arifio October 31, 2023

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation