CVE-2024-11036
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
19/11/2024
Last modified:
04/02/2025
Description
The The GamiPress – The #1 gamification plugin to reward points, achievements, badges & ranks in WordPress plugin for WordPress is vulnerable to arbitrary shortcode execution via gamipress_get_user_earnings AJAX action in all versions up to, and including, 7.1.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
Impact
Base Score 3.x
7.30
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:gamipress:gamipress:*:*:*:*:*:wordpress:*:* | 7.1.6 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://plugins.trac.wordpress.org/browser/gamipress/
- https://plugins.trac.wordpress.org/browser/gamipress/tags/7.1.4/includes/functions.php#L693
- https://plugins.trac.wordpress.org/browser/gamipress/tags/7.1.4/includes/functions.php#L702
- https://wordpress.org/plugins/gamipress/#developers
- https://www.wordfence.com/threat-intel/vulnerabilities/id/bad0cd3f-88ea-4a1d-b400-0a450b07a546?source=cve



