Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13495: CWE-94 Improper Control of Generation of Code ('Code Injection') in rubengc GamiPress – Gamification plugin to reward points, achievements, badges & ranks in WordPress

0
High
VulnerabilityCVE-2024-13495cvecve-2024-13495cwe-94
Published: Wed Jan 22 2025 (01/22/2025, 11:07:57 UTC)
Source: CVE Database V5
Vendor/Project: rubengc
Product: GamiPress – Gamification plugin to reward points, achievements, badges & ranks in WordPress

Description

CVE-2024-13495 is a high-severity vulnerability in the GamiPress WordPress plugin that allows unauthenticated attackers to execute arbitrary shortcodes via the gamipress_ajax_get_logs() function. This occurs because the plugin fails to properly validate input before passing it to the do_shortcode function, leading to code injection risks. Exploitation requires no authentication or user interaction and can impact confidentiality, integrity, and availability of affected WordPress sites. The vulnerability affects all versions up to and including 7. 2. 1. While no known exploits are currently reported in the wild, the ease of exploitation and broad impact make this a critical issue for websites using this plugin. Organizations should prioritize patching or applying mitigations to prevent potential compromise. Countries with large WordPress user bases and significant online presence are at higher risk. Immediate action is recommended to avoid unauthorized code execution and potential site takeover.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:11:56 UTC

Technical Analysis

CVE-2024-13495 is a code injection vulnerability classified under CWE-94 affecting the GamiPress – Gamification plugin for WordPress, which is widely used to reward points, achievements, badges, and ranks. The vulnerability arises from improper input validation in the gamipress_ajax_get_logs() function, which processes user-supplied data without adequate sanitization before invoking WordPress's do_shortcode function. This flaw enables unauthenticated attackers to inject and execute arbitrary shortcodes remotely, potentially leading to unauthorized code execution within the WordPress environment. Since shortcodes can execute PHP code or trigger other plugin functionality, this can compromise site confidentiality, integrity, and availability. The vulnerability affects all plugin versions up to 7.2.1, with no authentication or user interaction required for exploitation, making it highly accessible to attackers. Although no public exploits have been reported yet, the vulnerability's CVSS score of 7.3 (high) reflects its serious risk. The lack of official patches at the time of reporting increases the urgency for administrators to implement workarounds or monitor for suspicious activity. This vulnerability highlights the risks of insufficient input validation in WordPress plugins, especially those that handle dynamic content execution.

Potential Impact

The impact of CVE-2024-13495 is significant for organizations running WordPress sites with the vulnerable GamiPress plugin. Successful exploitation allows attackers to execute arbitrary shortcodes, which can lead to remote code execution, data leakage, unauthorized privilege escalation, defacement, or site disruption. This compromises the confidentiality of sensitive user data, the integrity of website content and configurations, and the availability of the service. Attackers could leverage this vulnerability to implant backdoors, pivot within the network, or conduct further attacks such as phishing or malware distribution. Given WordPress's widespread use for business, e-commerce, and community sites, the vulnerability poses a broad threat surface. Organizations without timely mitigation risk reputational damage, regulatory penalties, and operational downtime. The unauthenticated nature of the exploit increases the likelihood of automated scanning and mass exploitation attempts, especially once public exploit code becomes available.

Mitigation Recommendations

To mitigate CVE-2024-13495, organizations should immediately update the GamiPress plugin to a patched version once released by the vendor. Until an official patch is available, administrators can implement the following specific measures: 1) Disable or restrict access to the AJAX endpoint gamipress_ajax_get_logs() via web application firewall (WAF) rules or server-level access controls to prevent unauthenticated requests. 2) Employ input validation and sanitization at the web server or plugin level to block suspicious shortcode patterns or unexpected parameters. 3) Monitor web server logs and WordPress activity logs for unusual shortcode execution or AJAX requests targeting the vulnerable function. 4) Limit plugin usage to trusted users and consider temporarily deactivating the plugin if the risk outweighs its benefits. 5) Harden WordPress security by disabling unnecessary shortcode execution or restricting shortcode capabilities through custom filters. 6) Use security plugins that detect and block code injection attempts. These targeted steps go beyond generic advice by focusing on the vulnerable function and attack vector, reducing exposure until a patch is applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-16T20:24:24.435Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e5bb7ef31ef0b59ed6c

Added to database: 2/25/2026, 9:49:15 PM

Last enriched: 2/26/2026, 12:11:56 AM

Last updated: 2/26/2026, 6:11:09 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats