Cyber Posture

CVE-2025-0912

Critical

Published: 04 March 2025

Published
04 March 2025
Modified
05 March 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0215 84.3th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-0912 is a PHP Object Injection vulnerability (CWE-502) affecting the Donations Widget plugin for WordPress in all versions up to and including 3.19.4. The flaw arises from deserialization of untrusted input supplied via the 'card_address' parameter in the Donation Form, enabling attackers to inject a PHP Object. The presence of a POP chain in the plugin escalates this to remote code execution. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity.

Unauthenticated attackers can exploit this vulnerability remotely over the network with low complexity and no user interaction required. By submitting crafted input through the Donation Form's 'card_address' parameter, they can inject malicious PHP Objects, leveraging the available POP chain to execute arbitrary code on the server hosting the vulnerable WordPress site.

Patches addressing the vulnerability are available in the GiveWP plugin repository, as evidenced by changesets in the WordPress plugins trac, including modifications to BillingAddress.php, DonationRepository.php, and DonorRepository.php (changeset 3234114), along with a related GitHub pull request. Security practitioners should update to a patched version of the plugin to mitigate the issue.

Details

CWE(s)
CWE-502

Affected Products

givewp
givewp
≤ 3.20.0

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The PHP object injection vulnerability in a public-facing WordPress plugin directly enables unauthenticated remote code execution via exploitation of an Internet-facing application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References