// CVE-2024-5932 · UNAUTH RCE · DESERIALIZATION
GiveWP got hit?
We clean up.
An unauthenticated PHP object-injection in GiveWP let attackers run code on the server. Public PoC, mass scanning, exploited at scale starting August 2024. If your site ran an affected version, get a forensic look. Flat $279.
§ 01 — WHAT THE BUG WAS
User input → unserialize() → RCE via POP gadget.
GiveWP's donation form accepted a give_title parameter that ended up in PHP's unserialize() function. The plugin's codebase contained a chain of classes (a 'POP gadget chain') that, when triggered through that unserialize call, produced arbitrary code execution. No authentication required.
Affected: versions prior to 3.14.2. Disclosed August 7, 2024 with a working PoC. Patch was straightforward but install rollout was uneven — many sites stayed exposed for days.
§ 02 — INDICATORS
What we look at.
[ ACCESS LOG ]
POSTs to /?give_action=donation or admin-ajax.php with give_title containing serialized PHP (starts with O:, a:, s:). Surprisingly clear in logs.
[ FILES ]
Fresh PHP in wp-content/uploads/ or anywhere outside the GiveWP plugin folder after August 2024.
[ USERS ]
Admin accounts created since the disclosure. Often the immediate payload of the RCE.
[ ACTIVE_PLUGINS ]
wp_options active_plugins row containing plugins you didn't install. Frequently file-manager-style plugins used as a second-stage web shell.
§ PRICE
Flat $279. One-time. Per site.
[ RESCUE ]
$279
PAUSCHAL · EINMALIG · PRO SEITE
Manuelle Bereinigung, Eintrittsvektor identifiziert, schriftlicher forensischer Bericht. 30-Tage-Reinfektions-Garantie.
Bereinigung starten →[ SHIELD ]
$29 / mo
PRO SEITE · JEDERZEIT KÜNDBAR
Laufendes Monitoring, Absicherung, eine Bereinigung pro Jahr inklusive.
Schützen lassen →Seite kompromittiert? Auftrag starten.
Send us what you know. You get a triage and a fixed quote in return — no obligation.