
Cloud Vulnerability DB
A community-led vulnerabilities database
The GiveWP WordPress plugin before version 2.24.1 contained an unauthenticated SQL injection vulnerability identified as CVE-2023-0224. The vulnerability was discovered and responsibly disclosed through WPScan on January 19, 2023, affecting the core functionality of the GiveWP donation plugin (WPScan, GiveWP Blog).
The vulnerability stems from improper escaping of user input before it reaches SQL queries in the plugin's functionality. The issue specifically affects parameters including 'ids' (fixed in 2.24.0) and 'donors_per_page' (fixed in 2.24.1). The vulnerability has been assigned a CVSS score of 8.6 (high severity) and is classified as a CWE-89 SQL Injection vulnerability (WPScan).
This vulnerability could allow unauthenticated attackers to perform SQL injection attacks against affected WordPress websites. Successful exploitation could lead to unauthorized database access, potential data theft, and the ability to inject arbitrary commands or content into the website's database (GiveWP Blog).
The vulnerability was patched in GiveWP version 2.24.1. Site administrators are strongly advised to update to this version or later immediately. Additional security measures recommended include implementing web application firewalls like Cloudflare's WAF, which can protect against SQL injection attempts, and regularly monitoring for unexpected changes in website content or user accounts (GiveWP Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."