Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11036: CWE-94 Improper Control of Generation of Code ('Code Injection') in rubengc GamiPress – The #1 gamification plugin to reward points, achievements, badges & ranks in WordPress

0
High
VulnerabilityCVE-2024-11036cvecve-2024-11036cwe-94
Published: Tue Nov 19 2024 (11/19/2024, 11:02:29 UTC)
Source: CVE Database V5
Vendor/Project: rubengc
Product: GamiPress – The #1 gamification plugin to reward points, achievements, badges & ranks in WordPress

Description

CVE-2024-11036 is a high-severity vulnerability in the GamiPress WordPress plugin, allowing unauthenticated attackers to execute arbitrary shortcodes via the gamipress_get_user_earnings AJAX action. This occurs because the plugin fails to properly validate input before passing it to do_shortcode, enabling code injection. Exploitation requires no authentication or user interaction and can impact confidentiality, integrity, and availability of affected WordPress sites. The vulnerability affects all versions up to and including 7. 1. 5. While no known exploits are currently in the wild, the ease of exploitation and the plugin's popularity make this a significant risk. Organizations using GamiPress should prioritize patching or applying mitigations to prevent potential compromise. Countries with large WordPress user bases and significant web presence are most at risk. Immediate action is recommended to mitigate potential damage from arbitrary shortcode execution attacks.

AI-Powered Analysis

AILast updated: 02/26/2026, 07:56:39 UTC

Technical Analysis

CVE-2024-11036 is a code injection vulnerability classified under CWE-94, found in the GamiPress plugin for WordPress, which is widely used to gamify websites by rewarding points, achievements, badges, and ranks. The vulnerability arises from improper input validation in the gamipress_get_user_earnings AJAX action, where user-supplied data is passed directly to WordPress's do_shortcode function without adequate sanitization or validation. This flaw allows unauthenticated attackers to inject and execute arbitrary shortcodes on the affected WordPress site. Since shortcodes can execute PHP code or trigger other plugin functionalities, this can lead to unauthorized actions including data leakage, modification, or denial of service. The vulnerability affects all versions up to 7.1.5, with no authentication or user interaction required, making it remotely exploitable over the network. The CVSS v3.1 score of 7.3 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no privileges needed. Although no public exploits have been reported yet, the widespread use of GamiPress and the straightforward exploitation vector make this a critical concern for WordPress administrators. The vulnerability was publicly disclosed on November 19, 2024, with no official patches available at the time of reporting, increasing the urgency for mitigations or workarounds.

Potential Impact

The impact of CVE-2024-11036 is significant for organizations using the GamiPress plugin on WordPress sites. Successful exploitation can lead to arbitrary shortcode execution, which may allow attackers to execute malicious code, manipulate site content, steal sensitive user data, or disrupt site availability. This compromises the confidentiality, integrity, and availability of the affected web applications. Since the vulnerability requires no authentication and can be triggered remotely, it poses a high risk of automated exploitation and mass attacks. Organizations relying on GamiPress for gamification features may face defacement, data breaches, or service outages, potentially damaging reputation and user trust. Additionally, compromised WordPress sites can be leveraged as footholds for further network intrusion or used to distribute malware. The lack of patches at disclosure time increases exposure, making timely mitigation critical to reduce risk.

Mitigation Recommendations

1. Immediate mitigation should include disabling or restricting access to the gamipress_get_user_earnings AJAX action via web application firewall (WAF) rules or server-level access controls to block unauthenticated requests targeting this endpoint. 2. Monitor web server and WordPress logs for suspicious requests containing shortcode-like payloads or unusual AJAX activity related to GamiPress. 3. If possible, temporarily deactivate the GamiPress plugin until an official patch is released. 4. Employ input validation and sanitization at the application or plugin level by customizing or extending plugin code to validate and sanitize inputs before passing them to do_shortcode, if feasible. 5. Keep WordPress core, themes, and all plugins updated and subscribe to vendor advisories for prompt patch application once available. 6. Implement least privilege principles for WordPress user roles and restrict plugin management capabilities to trusted administrators only. 7. Conduct regular security audits and penetration testing focused on plugin vulnerabilities and shortcode execution paths. 8. Prepare incident response plans to quickly address potential exploitation scenarios involving this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-11-08T23:26:37.163Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e04b7ef31ef0b593ad5

Added to database: 2/25/2026, 9:47:48 PM

Last enriched: 2/26/2026, 7:56:39 AM

Last updated: 2/26/2026, 10:22:01 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats