The The GamiPress – Gamification plugin to reward points, achievements, badges & ranks in WordPress plugin for WordPress is vulnerable to arbitrary shortcode execution via the gamipress_ajax_get_logs() function in all versions up to, and including, 7.2.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
References
Configurations
History
24 Jan 2025, 20:46
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
First Time |
Gamipress
Gamipress gamipress |
|
References | () https://plugins.trac.wordpress.org/browser/gamipress/trunk/includes/ajax-functions.php#L39 - Product | |
References | () https://plugins.trac.wordpress.org/changeset/3226227/ - Patch | |
References | () https://wordpress.org/plugins/gamipress/#developers - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/55fa8423-9a41-4afe-9401-03d232caa656?source=cve - Third Party Advisory | |
CPE | cpe:2.3:a:gamipress:gamipress:*:*:*:*:*:wordpress:*:* |
22 Jan 2025, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-22 11:15
Updated : 2025-01-24 20:46
NVD link : CVE-2024-13495
Mitre link : CVE-2024-13495
CVE.ORG link : CVE-2024-13495
JSON object : View
Products Affected
gamipress
- gamipress
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')