Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9130: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in webdevmattcrom GiveWP – Donation Plugin and Fundraising Platform

0
High
VulnerabilityCVE-2024-9130cvecve-2024-9130cwe-89
Published: Fri Sep 27 2024 (09/27/2024, 05:31:02 UTC)
Source: CVE Database V5
Vendor/Project: webdevmattcrom
Product: GiveWP – Donation Plugin and Fundraising Platform

Description

CVE-2024-9130 is a high-severity SQL Injection vulnerability in the GiveWP Donation Plugin and Fundraising Platform for WordPress, affecting all versions up to 3. 16. 1. It allows authenticated users with GiveWP Manager-level access or higher to exploit a time-based SQL Injection via the 'order' parameter in Legacy View mode. The vulnerability arises from insufficient escaping and lack of proper query preparation, enabling attackers to append malicious SQL commands to extract sensitive database information. Exploitation does not require user interaction but does require elevated plugin privileges. Although no known exploits are currently reported in the wild, the vulnerability poses significant risks to confidentiality, integrity, and availability of affected systems. Organizations using GiveWP for donation and fundraising management should prioritize patching or mitigating this flaw. Countries with widespread WordPress and GiveWP usage, especially those with active charitable sectors, are at higher risk. Immediate mitigation includes restricting access to privileged roles, monitoring database queries, and applying updates once available.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:05:11 UTC

Technical Analysis

CVE-2024-9130 is a time-based SQL Injection vulnerability identified in the GiveWP – Donation Plugin and Fundraising Platform for WordPress, affecting all versions up to and including 3.16.1. The flaw exists due to improper neutralization of special elements in SQL commands (CWE-89), specifically through the 'order' parameter in the plugin's Legacy View mode. The plugin fails to sufficiently escape user-supplied input and does not use parameterized queries or prepared statements, allowing authenticated attackers with GiveWP Manager-level privileges or higher to inject arbitrary SQL code. This injection can be used to append additional SQL queries to existing ones, enabling extraction of sensitive data from the underlying database. The vulnerability requires authentication but no user interaction beyond that, and the attack vector is network accessible (AV:N). The CVSS v3.1 base score is 7.2, reflecting high severity due to the potential for full confidentiality, integrity, and availability compromise. No public exploits have been reported yet, but the vulnerability's presence in a widely used WordPress plugin makes it a significant concern. The lack of patch links suggests that a fix may not yet be available, emphasizing the need for immediate mitigation steps.

Potential Impact

The impact of CVE-2024-9130 is substantial for organizations using the GiveWP plugin for managing donations and fundraising. Successful exploitation can lead to unauthorized disclosure of sensitive donor information, financial data, and other confidential records stored in the database. Attackers could manipulate or delete data, undermining data integrity and potentially disrupting fundraising operations, leading to loss of trust and financial damage. Given the plugin’s role in handling monetary transactions and donor details, breaches could also result in regulatory compliance violations such as GDPR or PCI DSS. The requirement for authenticated access limits exposure somewhat, but insider threats or compromised accounts with Manager-level privileges could exploit this vulnerability. The time-based nature of the SQL injection may allow attackers to extract data slowly, evading detection. Overall, the vulnerability threatens confidentiality, integrity, and availability of critical fundraising infrastructure.

Mitigation Recommendations

To mitigate CVE-2024-9130, organizations should immediately restrict GiveWP Manager-level access to trusted personnel only and audit existing accounts for unnecessary privileges. Implement strict access controls and monitor logs for unusual database query patterns indicative of SQL injection attempts. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the 'order' parameter. Until an official patch is released, consider disabling Legacy View mode if feasible or limiting its accessibility. Regularly back up databases and test restoration procedures to minimize impact from potential data manipulation. Engage with the plugin vendor or community to obtain updates or patches as soon as they become available. Additionally, conduct security training to raise awareness about the risks of privilege misuse. For long-term prevention, advocate for the use of parameterized queries and input validation in plugin development.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-09-23T22:00:37.353Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b41b7ef31ef0b54fc6f

Added to database: 2/25/2026, 9:36:01 PM

Last enriched: 2/25/2026, 11:05:11 PM

Last updated: 2/26/2026, 8:33:14 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats