{"vulnerability": "CVE-2024-5932", "sightings": [{"uuid": "875d5968-5c14-452b-a42b-721c6f1f99e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "4b091db4-2e8c-4b65-af7d-243eb7ab7073", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_givewp_rce.rb", "content": "", "creation_timestamp": "2024-08-28T20:39:04.000000Z"}, {"uuid": "26e0f959-7f5a-4c4d-aa9b-31943d21259a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:11:05.000000Z"}, {"uuid": "a67bca21-70cc-41ad-bfa7-26047ba24057", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "seen", "source": "https://gist.github.com/jaredfolkins/600cb7daa0be7c977443205c2d073615", "content": "", "creation_timestamp": "2025-02-28T20:06:20.000000Z"}, {"uuid": "4298ec70-1fca-4ec1-aadd-1e4c0d9a5be1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3llf73zvzj52p", "content": "", "creation_timestamp": "2025-03-27T21:02:07.333310Z"}, {"uuid": "2b2eb85c-66dd-4885-be40-695b6375d391", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:04.000000Z"}, {"uuid": "3755fd2e-f265-4a88-92c7-4b126d1de423", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8321", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aProof-of-Concept for CVE-2024-5932  GiveWP PHP Object Injection \nURL\uff1ahttps://github.com/0xb0mb3r/CVE-2024-5932-PoC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-10T04:26:45.000000Z"}, {"uuid": "36c1f778-0573-437c-90b4-9ef76b4b56ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/436", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aProof-of-Concept for CVE-2024-5932\nURL\uff1ahttps://github.com/l8BL/CVE-2024-47066\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-25T05:16:47.000000Z"}, {"uuid": "4a3a0802-3f15-4783-870a-a98af12790a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "Telegram/D5Tu51kSkXbo-9bxr-qOR_ZOPzuIV30YFNBGrLAWHGZFmmE", "content": "", "creation_timestamp": "2025-11-05T09:00:05.000000Z"}, {"uuid": "f41f0832-9134-417e-941a-1f6f864d84b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8363", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPoC for CVE-2024-5932\nURL\uff1ahttps://github.com/EQSTSeminar/CVE-2024-5932\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-25T12:00:03.000000Z"}, {"uuid": "fc0c68d6-c851-4113-9e69-3ab80f484315", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8394", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aProof-of-Concept for CVE-2024-5932\nURL\uff1ahttps://github.com/EQSTLab/CVE-2024-5932\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-28T10:21:46.000000Z"}, {"uuid": "37b0956f-21e5-4d57-8613-6c19a055609c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8392", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aProof-of-Concept for CVE-2024-5932\nURL\uff1ahttps://github.com/EQSTLab/CVE-2024-5932-PoC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-28T09:59:57.000000Z"}, {"uuid": "6102f699-62ba-46db-a6ff-e973509132e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8386", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aProof-of-Concept for CVE-2024-5932 \nURL\uff1ahttps://github.com/sqlmap-projects/CVE-2024-5932\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-28T00:37:13.000000Z"}, {"uuid": "8bb1cbf9-8de4-4d67-bddc-7d8fb5acc505", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/hackingbra/192", "content": "CVE-2024-5932 \n*\nWordPress GiveWP POP to RCE\n*\nPOC exploit", "creation_timestamp": "2024-08-29T12:35:29.000000Z"}, {"uuid": "80b092fc-712d-498c-a8ae-a6f9a1f4a491", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "seen", "source": "https://t.me/GithubRedTeam/8585", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aProof-of-Concept for CVE-2024-5932\nURL\uff1ahttps://github.com/l8BL/CVE-2024-47066\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-24T10:01:15.000000Z"}, {"uuid": "b14b6855-3166-49e6-85e2-56c57cb9651f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8385", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aProof-of-Concept for CVE-2024-5932\nURL\uff1ahttps://github.com/niktoproject/CVE-2024-5932\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-28T00:33:04.000000Z"}, {"uuid": "a331cbef-2525-49a1-a6fe-4cc48145cd02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9411", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aProof-of-Concept for CVE-2024-5932  GiveWP PHP Object Injection \nURL\uff1ahttps://github.com/TAM-K592/CVE-2024-53677-S2-067\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-12-13T17:48:29.000000Z"}, {"uuid": "84779110-142d-4b76-be2d-fb172d798f5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/six5zeroexploit/68", "content": "Wordpress GiveWP Plugin RCE Exploit (CVE-2024-5932)\n\nIf You Want Private Tools For Good Result DM: https://t.me/NullHextral\nJoin and Share https://t.me/six5zeroexploit", "creation_timestamp": "2024-09-22T10:37:56.000000Z"}, {"uuid": "39195341-0e8a-4055-ab42-a2b481afe412", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "Telegram/6H4jcUE95EKXzm1YwE2bwqiF3BXGONJMZD9T_2IZ_846HqY", "content": "", "creation_timestamp": "2024-12-09T15:44:13.000000Z"}, {"uuid": "f955e580-b874-4f3c-990f-72332e95051b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "seen", "source": "https://t.me/cvedetector/6592", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8353 - GiveWP PHP Object Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-8353 \nPublished : Sept. 28, 2024, 2:15 a.m. | 37\u00a0minutes ago \nDescription : The GiveWP \u2013 Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.16.1 via deserialization of untrusted input via several parameters like 'give_title' and 'card_address'. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files and achieve remote code execution. This is essentially the same vulnerability as CVE-2024-5932, however, it was discovered the the presence of stripslashes_deep on user_info allows the is_serialized check to be bypassed. This issue was mostly patched in 3.16.1, but further hardening was added in 3.16.2. \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-28T05:17:09.000000Z"}, {"uuid": "7c8cfe20-e484-48bd-aa85-cd996135de83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/cyber_hsecurity/4439", "content": "", "creation_timestamp": "2025-05-04T07:31:22.000000Z"}, {"uuid": "529c0c64-a45a-4a97-b35c-bf1c1f991ba9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "Telegram/TF8Vs6bNYDBC4FvfJA4wAxk-gnvDesrZRCD6Q4ejnVeW_ys", "content": "", "creation_timestamp": "2024-12-09T15:43:12.000000Z"}, {"uuid": "475eafc1-21bb-4619-b86d-401e183dd91e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "seen", "source": "Telegram/n1cKpTo1YZG03Fp2_v6aVF95dfI4Hw-1TtYepzj3seBijw", "content": "", "creation_timestamp": "2024-08-21T09:48:51.000000Z"}, {"uuid": "9058530a-c71a-4c6a-a083-60babbabeab7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/233", "content": "#exploit\n1. CVE-2024-4879:\nJelly Template Injection Vulnerability in ServiceNow\nhttps://blog.redteam-pentesting.de/2024/moodle-rce\n\n2. CVE-2024-5932:\nWordPress GiveWP Donation/Fundraising Platform 3.14.1 Code Execution\nhttps://packetstormsecurity.com/files/180463/WordPress-GiveWP-Donation-Fundraising-Platform-3.14.1-Code-Execution.html", "creation_timestamp": "2024-08-30T18:56:36.000000Z"}, {"uuid": "9143df08-768c-4d7d-94dc-d11406efbed1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "seen", "source": "https://t.me/cvedetector/3590", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5932 - GiveWP - PHP Object Injection and Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-5932 \nPublished : Aug. 20, 2024, 2:15 a.m. | 17\u00a0minutes ago \nDescription : The GiveWP \u2013 Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.14.1 via deserialization of untrusted input from the 'give_title' parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to execute code remotely, and to delete arbitrary files. \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-20T04:34:57.000000Z"}, {"uuid": "9cf4bda7-c135-4164-8045-f83741438796", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/231", "content": "CVE-2024-5932 \n*\nWordPress GiveWP POP to RCE\n*\nPOC exploit", "creation_timestamp": "2024-08-29T12:43:57.000000Z"}, {"uuid": "82740f6c-c33a-4bb2-ac8f-78066f538bec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "seen", "source": "https://t.me/Kelvinseccommunity/756", "content": "GiveWP WordPress Plugin Vulnerability Puts 100,000+ Websites at Risk\nhttps://thehackernews.com/2024/08/givewp-wordpress-plugin-vulnerability.html\n\nA maximum-severity security flaw has been disclosed in the WordPress GiveWP donation and fundraising plugin that exposes more than 100,000 websites to remote code execution attacks.\nThe flaw, tracked as CVE-2024-5932 (CVSS score: 10.0), impacts all versions of the plugin prior to version 3.14.2, which was released on August 7, 2024. A security researcher, who goes by the online alias villu164,", "creation_timestamp": "2024-08-21T08:31:34.000000Z"}, {"uuid": "3c3b128b-6b85-4f16-b5b6-b110dd749ec9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/BlackHat0Hackers/3534", "content": "CVE-2024-5932 \n*\nWordPress GiveWP POP to RCE\n*\nPOC exploit", "creation_timestamp": "2024-10-05T11:03:44.000000Z"}, {"uuid": "26595a07-244b-4af0-a53d-aa58a4c649a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/Team_Dot33/692", "content": "Wordpress GiveWP Plugin RCE Exploit (CVE-2024-5932)\n\nIf You Want Private Tools For Good Result DM: https://t.me/NullHextral\nJoin and Share https://t.me/six5zeroexploit", "creation_timestamp": "2024-10-11T08:02:19.000000Z"}, {"uuid": "577eff15-95bb-470a-af9f-ca6fd6a28d6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "seen", "source": "https://t.me/Blackhat_Officials/1389", "content": "GiveWP WordPress Plugin Vulnerability Puts 100,000+ Websites at Risk\nhttps://thehackernews.com/2024/08/givewp-wordpress-plugin-vulnerability.html\n\nA maximum-severity security flaw has been disclosed in the WordPress GiveWP donation and fundraising plugin that exposes more than 100,000 websites to remote code execution attacks.\nThe flaw, tracked as CVE-2024-5932 (CVSS score: 10.0), impacts all versions of the plugin prior to version 3.14.2, which was released on August 7, 2024. A security researcher, who goes by the online alias villu164,", "creation_timestamp": "2024-08-21T08:32:18.000000Z"}, {"uuid": "607f27e9-ee16-41dc-8238-bde3dc7f3da5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/six5zeroexploit/93", "content": "\ud83d\ude35\u200d\ud83d\udcab DM To Join \u2705\n\n\u2604\ufe0f Contact \u27a1\ufe0f @NullHextral \u2705\n\u2604\ufe0f Channel \u27a1\ufe0f\u00a0@six5zeroexploit \u2705", "creation_timestamp": "2024-12-07T01:55:47.000000Z"}, {"uuid": "ead84567-ebbd-4c46-b7ae-9c0a24b58d21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/10628", "content": "\u200aCVE-2024-5932 (CVSS 10): Critical RCE Vulnerability Impacts 100k+ WordPress Sites\n\nhttps://securityonline.info/cve-2024-5932-cvss-10-critical-rce-vulnerability-impacts-100k-wordpress-sites/", "creation_timestamp": "2024-08-20T13:04:10.000000Z"}, {"uuid": "cae78400-e826-42d7-b8aa-fc765a3002f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "Telegram/WAVpI_mJxo3wUBY2hzto7NtUeqMIoVhFYJC69arERR2U", "content": "", "creation_timestamp": "2024-10-11T10:01:41.000000Z"}, {"uuid": "62347aa9-1796-459f-95aa-410273a3c18b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/18359", "content": "The Hacker News\nGiveWP WordPress Plugin Vulnerability Puts 100,000+ Websites at Risk\n\nA maximum-severity security flaw has been disclosed in the WordPress GiveWP donation and fundraising plugin that exposes more than 100,000 websites to remote code execution attacks.\nThe flaw, tracked as CVE-2024-5932 (CVSS score: 10.0), impacts all versions of the plugin prior to version 3.14.2, which was released on August 7, 2024. A security researcher, who goes by the online alias villu164,", "creation_timestamp": "2024-08-21T09:48:51.000000Z"}, {"uuid": "1a9a3017-cff8-4062-9087-8c58786009fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "Telegram/EZddkYqkboEk0cmGuSOX9VuQrZaciDyyzWDWEZuPrcby3jeK", "content": "", "creation_timestamp": "2024-12-09T16:44:13.000000Z"}, {"uuid": "66489c57-eede-479a-ab16-fc4f76ea99eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "Telegram/ILyJ6K1ycSMNbsG96eFJPNoFRNMf6drptEVPTG6COjbL3w", "content": "", "creation_timestamp": "2024-08-21T10:00:49.000000Z"}, {"uuid": "0420d36c-c7c7-441b-84c0-6ad67898a895", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/hitshare/2809", "content": "Wordpress GiveWP Plugin RCE Exploit (CVE-2024-5932)", "creation_timestamp": "2024-10-11T12:24:11.000000Z"}, {"uuid": "96c44071-6ad0-4f3b-9721-99537c8253bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "Telegram/26m3io3CxIbSducaPZiRB4zkX9wxvv0W5PpBovFhQPHDAmA", "content": "", "creation_timestamp": "2024-09-27T18:49:57.000000Z"}, {"uuid": "1792133a-3a1f-465c-91b3-ab1cadabf35f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "Telegram/qZM0NNijhQe30uI1HDidP8z9iH_9o-A7s4eoxr8GKg4wvWY", "content": "", "creation_timestamp": "2024-09-06T08:08:13.000000Z"}, {"uuid": "f7f6e429-213f-47fd-8530-023fa42f0212", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/3666", "content": "The Hacker News\nGiveWP WordPress Plugin Vulnerability Puts 100,000+ Websites at Risk\n\nA maximum-severity security flaw has been disclosed in the WordPress GiveWP donation and fundraising plugin that exposes more than 100,000 websites to remote code execution attacks.\nThe flaw, tracked as CVE-2024-5932 (CVSS score: 10.0), impacts all versions of the plugin prior to version 3.14.2, which was released on August 7, 2024. A security researcher, who goes by the online alias villu164,", "creation_timestamp": "2024-08-21T09:48:51.000000Z"}, {"uuid": "d4fe21f6-76e8-4a91-9bca-ca49ef37eb29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/softrinx/146844", "content": "CVE-2024-5932 \n*\nWordPress GiveWP POP to RCE\n*\nPOC exploit", "creation_timestamp": "2024-08-30T12:27:54.000000Z"}, {"uuid": "1ebca40f-f27d-42ae-af22-5c9e029ad866", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/KomunitiSiber/2434", "content": "GiveWP WordPress Plugin Vulnerability Puts 100,000+ Websites at Risk\nhttps://thehackernews.com/2024/08/givewp-wordpress-plugin-vulnerability.html\n\nA maximum-severity security flaw has been disclosed in the WordPress GiveWP donation and fundraising plugin that exposes more than 100,000 websites to remote code execution attacks.\nThe flaw, tracked as CVE-2024-5932 (CVSS score: 10.0), impacts all versions of the plugin prior to version 3.14.2, which was released on August 7, 2024. A security researcher, who goes by the online alias villu164,", "creation_timestamp": "2024-08-21T07:42:25.000000Z"}, {"uuid": "d1132acf-4243-4044-920b-dfab03359508", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "Telegram/fHkb0CM1FzFAB8xBTZyHf3gn0Hu7gob4-PsX9T3gFkP-8Qga", "content": "", "creation_timestamp": "2024-12-09T16:43:12.000000Z"}, {"uuid": "d4950a8c-fe10-4c90-8860-e29367c1786a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/bads_community/1453", "content": "Wordpress GiveWP Plugin RCE Exploit (CVE-2024-5932)\n\nIf You Want Private Tools For Good Result DM: https://t.me/NullHextral\nJoin and Share https://t.me/six5zeroexploit", "creation_timestamp": "2024-09-22T10:37:56.000000Z"}, {"uuid": "94665010-e3a6-4bef-870d-918ca2a46c73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/bads_community/1603", "content": "\ud83d\ude35\u200d\ud83d\udcab DM To Join \u2705\n\n\u2604\ufe0f Contact \u27a1\ufe0f @NullHextral \u2705\n\u2604\ufe0f Channel \u27a1\ufe0f\u00a0@six5zeroexploit \u2705", "creation_timestamp": "2024-12-07T01:56:17.000000Z"}, {"uuid": "6425a32b-70eb-4f09-8887-d8bca04b281a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/bads_community/39028", "content": "Wordpress GiveWP Plugin RCE Exploit (CVE-2024-5932)\n\nIf You Want Private Tools For Good Result DM: https://t.me/NullHextral\nJoin and Share https://t.me/six5zeroexploit", "creation_timestamp": "2024-09-22T10:37:56.000000Z"}, {"uuid": "142ba79b-79ba-4339-ad17-ff5907c0882a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/bads_community/76167", "content": "\ud83d\ude35\u200d\ud83d\udcab DM To Join \u2705\n\n\u2604\ufe0f Contact \u27a1\ufe0f @NullHextral \u2705\n\u2604\ufe0f Channel \u27a1\ufe0f\u00a0@six5zeroexploit \u2705", "creation_timestamp": "2024-12-07T01:56:17.000000Z"}, {"uuid": "582cefd8-f456-4ddb-b9b4-726246c80418", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/bads_group/76166", "content": "\ud83d\ude35\u200d\ud83d\udcab DM To Join \u2705\n\n\u2604\ufe0f Contact \u27a1\ufe0f @NullHextral \u2705\n\u2604\ufe0f Channel \u27a1\ufe0f\u00a0@six5zeroexploit \u2705", "creation_timestamp": "2024-12-07T01:56:14.000000Z"}, {"uuid": "4e56be7d-d502-4ddc-8e40-359db9fe3d0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/mad_hackers_community/440", "content": "\ud83d\ude35\u200d\ud83d\udcab DM To Join \u2705\n\n\u2604\ufe0f Contact \u27a1\ufe0f @NullHextral \u2705\n\u2604\ufe0f Channel \u27a1\ufe0f\u00a0@six5zeroexploit \u2705", "creation_timestamp": "2024-12-07T01:56:17.000000Z"}, {"uuid": "0e3ae017-7e07-494f-9f59-ee49e182c6dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/mad_hackers_community/352", "content": "Wordpress GiveWP Plugin RCE Exploit (CVE-2024-5932)\n\nIf You Want Private Tools For Good Result DM: https://t.me/NullHextral\nJoin and Share https://t.me/six5zeroexploit", "creation_timestamp": "2024-09-22T10:37:56.000000Z"}, {"uuid": "c5d224a3-9d25-4614-a651-d68df64f1bcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2251", "content": "CVE-2024-5932 \n*\nWordPress GiveWP POP to RCE\n*\nPOC exploit", "creation_timestamp": "2024-08-29T12:18:16.000000Z"}, {"uuid": "59b8a5b1-21a3-4602-a7c7-94175bd2c62f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/softrinx/477", "content": "CVE-2024-5932 \n*\nWordPress GiveWP POP to RCE\n*\nPOC exploit", "creation_timestamp": "2024-08-30T12:27:54.000000Z"}, {"uuid": "38ccf8ca-65e5-4c1c-9562-e56b0785a8c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "Telegram/WgpEig7cHbSwl6zO84Cy6KIpQtYjfwm8moSVfjTLyb9KLu9O", "content": "", "creation_timestamp": "2024-10-15T13:19:05.000000Z"}, {"uuid": "596d7ef6-1058-4dae-b822-999488296281", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "seen", "source": "https://t.me/true_secator/6114", "content": "Defiant \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u0435\u0442 \u043e \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u043e\u0448\u0438\u0431\u043a\u0435 \u0432 \u043f\u043b\u0430\u0433\u0438\u043d\u0435 GiveWP, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0434\u043b\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 \u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u044f \u0444\u0430\u0439\u043b\u043e\u0432, \u0443\u0433\u0440\u043e\u0436\u0430\u044f \u0431\u043e\u043b\u0435\u0435 100\u00a0000 \u0441\u0430\u0439\u0442\u0430\u043c WordPress.\n\n\u041e\u0448\u0438\u0431\u043a\u0430 \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a CVE-2024-5932 \u0438 \u0438\u043c\u0435\u0435\u0442 \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u0443\u044e \u043e\u0446\u0435\u043d\u043a\u0443 CVSS 10/10, \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u044f \u0441\u043e\u0431\u043e\u0439 \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u0435 PHP-\u043e\u0431\u044a\u0435\u043a\u0442\u0430 \u043f\u043e\u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e\u043c \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043d\u0435\u043d\u0430\u0434\u0435\u0436\u043d\u044b\u0445 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438\u0437 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u0430 give_title.\n\n\u041d\u0435\u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u0440\u0435\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u0435\u0444\u0435\u043a\u0442, \u0447\u0442\u043e\u0431\u044b \u0432\u043d\u0435\u0434\u0440\u0438\u0442\u044c PHP-\u043e\u0431\u044a\u0435\u043a\u0442, \u0430 \u0437\u0430\u0442\u0435\u043c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0446\u0435\u043f\u043e\u0447\u043a\u0443 POP (Property Oriented Programming) \u0434\u043b\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0438\u043b\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432.\n\n\u0424\u0443\u043d\u043a\u0446\u0438\u044f, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043e\u0431\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u0435\u0442 \u043f\u043e\u0436\u0435\u0440\u0442\u0432\u043e\u0432\u0430\u043d\u0438\u044f, \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u043e\u0432\u0435\u0440\u044f\u0435\u0442 \u0434\u0430\u043d\u043d\u044b\u0435 \u043f\u043e\u0441\u0442\u0430 \u0438 \u043f\u0440\u043e\u0432\u0435\u0440\u044f\u0435\u0442, \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0442 \u043b\u0438 \u043e\u043d\u0438 \u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u044f, \u043d\u043e \u043d\u0435 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440 \u043f\u043e\u0441\u0442\u0430 give_title.\n\n\u041f\u043e\u0441\u043b\u0435 \u0437\u0430\u0432\u0435\u0440\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0432\u044b\u0437\u044b\u0432\u0430\u044e\u0442\u0441\u044f \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u0434\u043b\u044f \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0438 \u0441\u043e\u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0444\u0443\u043d\u043a\u0446\u0438\u0438, \u0441\u043e\u0431\u0438\u0440\u0430\u044e\u0449\u0438\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435, \u0442\u0430\u043a\u0443\u044e \u043a\u0430\u043a \u0437\u0430\u0433\u043e\u043b\u043e\u0432\u043e\u043a \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043e\u0441\u043d\u043e\u0432\u0430\u043d \u043d\u0430 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u0435 \u0437\u0430\u043f\u0438\u0441\u0438 give_title.\n\n\u0417\u0430\u0442\u0435\u043c \u0432\u044b\u0437\u044b\u0432\u0430\u044e\u0442\u0441\u044f \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u0434\u043b\u044f \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u043f\u043b\u0430\u0442\u0435\u0436\u043d\u043e\u0439 \u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, \u0438 \u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u043e\u0435 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435 \u0437\u0430\u0433\u043e\u043b\u043e\u0432\u043a\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f, \u0437\u0430\u043f\u0438\u0441\u0430\u043d\u043d\u043e\u0435 \u0432 \u0431\u0430\u0437\u0443 \u0434\u0430\u043d\u043d\u044b\u0445 \u043a\u0430\u043a \u043a\u043b\u044e\u0447\u0435\u0432\u043e\u0435 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435, \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0443\u0435\u0442\u0441\u044f \u043e\u0434\u043d\u043e\u0439 \u0438\u0437 \u043d\u0438\u0445.\n\n\u041f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0441\u0432\u043e\u0439\u0441\u0442\u0432\u0430 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u043e\u0431\u044a\u0435\u043a\u0442\u0430, \u043e\u043d \u043c\u043e\u0436\u0435\u0442 \u043e\u0431\u044a\u0435\u0434\u0438\u043d\u044f\u0442\u044c \u043a\u043e\u0434 \u0432 \u0446\u0435\u043f\u043e\u0447\u043a\u0443 \u0434\u043b\u044f RCE \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 \u0438\u043b\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432.\n\n\u0412 \u0437\u0430\u0432\u0438\u0441\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0438\u043d\u0438\u0446\u0438\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0441\u0431\u0440\u043e\u0441 \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043a \u0441\u0430\u0439\u0442\u0430, \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0437\u0430\u0445\u0432\u0430\u0442\u0438\u0432 \u0435\u0433\u043e, \u0435\u0441\u043b\u0438 \u043e\u043d \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0438\u0442 \u0435\u0433\u043e \u043a \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0439 \u0431\u0430\u0437\u0435 \u0434\u0430\u043d\u043d\u044b\u0445, \u043d\u0430\u0445\u043e\u0434\u044f\u0449\u0435\u0439\u0441\u044f \u043f\u043e\u0434 \u0435\u0433\u043e \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0435\u043c.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 GiveWP \u0432\u0435\u0440\u0441\u0438\u0438 3.14.1 \u0438 \u0431\u043e\u043b\u0435\u0435 \u0440\u0430\u043d\u043d\u0438\u0445 \u0432\u0435\u0440\u0441\u0438\u0439 \u0438 \u0431\u044b\u043b\u0430 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 \u0441 \u0432\u044b\u043f\u0443\u0441\u043a\u043e\u043c 3.14.2.\n\n\u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0434\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 \u043f\u043b\u0430\u0433\u0438\u043d\u0430 \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435.", "creation_timestamp": "2024-08-20T18:01:05.000000Z"}, {"uuid": "f1415aa8-e633-4c7d-9b92-c308636656b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "Telegram/oLGdsO7OYb3TfdUbQH0jy-A5TJwt4fzzmjTGX3o2dA-Cl_QbbQ", "content": "", "creation_timestamp": "2024-12-09T16:43:12.000000Z"}, {"uuid": "3237513e-6b82-48ff-9be3-189424f58e21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/4257", "content": "#exploit\n1. CVE-2024-4879:\nJelly Template Injection Vulnerability in ServiceNow\nhttps://blog.redteam-pentesting.de/2024/moodle-rce\n\n2. CVE-2024-5932:\nWordPress GiveWP Donation/Fundraising Platform 3.14.1 Code Execution\nhttps://packetstormsecurity.com/files/180463/WordPress-GiveWP-Donation-Fundraising-Platform-3.14.1-Code-Execution.html", "creation_timestamp": "2024-08-30T06:50:06.000000Z"}, {"uuid": "6d84aca9-ff5c-410f-be01-aa00b459a506", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11054", "content": "#exploit\n1. CVE-2024-4879:\nJelly Template Injection Vulnerability in ServiceNow\nhttps://blog.redteam-pentesting.de/2024/moodle-rce\n\n2. CVE-2024-5932:\nWordPress GiveWP Donation/Fundraising Platform 3.14.1 Code Execution\nhttps://packetstormsecurity.com/files/180463/WordPress-GiveWP-Donation-Fundraising-Platform-3.14.1-Code-Execution.html", "creation_timestamp": "2024-08-30T16:51:16.000000Z"}, {"uuid": "a67f7f59-9e01-4517-86d3-c762c2bcdea0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/malwarezh/24", "content": "#WordPress #GiveWP POP to RCE (#CVE-2024-5932 CVSS 10)\n\nThe GiveWP \u2013 Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.14.1 via deserialization of untrusted input from the 'give_title' parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to execute code remotely, and to delete arbitrary files.\n\nPOC: https://github.com/EQSTSeminar/CVE-2024-5932\n\nSearch Query:\nHUNTER:  web.body=\"/wp-content/plugins/give\"\n\n\n========================\n\ud83c\udf10 Owner: @z3xrin \u2705\n\ud83c\udf10 Channel: @Malwarezh \n========================", "creation_timestamp": "2024-10-16T23:31:10.000000Z"}, {"uuid": "d42e30ec-a7f5-4f43-8519-292525124273", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/4261", "content": "#exploit\n1. CVE-2024-4879:\nJelly Template Injection Vulnerability in ServiceNow\nhttps://blog.redteam-pentesting.de/2024/moodle-rce\n\n2. CVE-2024-5932:\nWordPress GiveWP Donation/Fundraising Platform 3.14.1 Code Execution\nhttps://packetstormsecurity.com/files/180463/WordPress-GiveWP-Donation-Fundraising-Platform-3.14.1-Code-Execution.html", "creation_timestamp": "2024-08-30T20:36:47.000000Z"}, {"uuid": "4d5caed4-d8a0-4a5d-b5cb-b4053472d1f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5932", "type": "published-proof-of-concept", "source": "https://t.me/oxlogs/24", "content": "", "creation_timestamp": "2024-12-07T17:48:16.000000Z"}]}