CVE-2024-13495: CWE-94 Improper Control of Generation of Code ('Code Injection') in rubengc GamiPress – Gamification plugin to reward points, achievements, badges & ranks in WordPress
CVE-2024-13495 is a high-severity vulnerability in the GamiPress WordPress plugin that allows unauthenticated attackers to execute arbitrary shortcodes via the gamipress_ajax_get_logs() function. This occurs because the plugin fails to properly validate input before passing it to the do_shortcode function, leading to code injection risks. Exploitation requires no authentication or user interaction and can impact confidentiality, integrity, and availability of affected WordPress sites. The vulnerability affects all versions up to and including 7. 2. 1. While no known exploits are currently reported in the wild, the ease of exploitation and broad impact make this a critical issue for websites using this plugin. Organizations should prioritize patching or applying mitigations to prevent potential compromise. Countries with large WordPress user bases and significant online presence are at higher risk. Immediate action is recommended to avoid unauthorized code execution and potential site takeover.
AI Analysis
Technical Summary
CVE-2024-13495 is a code injection vulnerability classified under CWE-94 affecting the GamiPress – Gamification plugin for WordPress, which is widely used to reward points, achievements, badges, and ranks. The vulnerability arises from improper input validation in the gamipress_ajax_get_logs() function, which processes user-supplied data without adequate sanitization before invoking WordPress's do_shortcode function. This flaw enables unauthenticated attackers to inject and execute arbitrary shortcodes remotely, potentially leading to unauthorized code execution within the WordPress environment. Since shortcodes can execute PHP code or trigger other plugin functionality, this can compromise site confidentiality, integrity, and availability. The vulnerability affects all plugin versions up to 7.2.1, with no authentication or user interaction required for exploitation, making it highly accessible to attackers. Although no public exploits have been reported yet, the vulnerability's CVSS score of 7.3 (high) reflects its serious risk. The lack of official patches at the time of reporting increases the urgency for administrators to implement workarounds or monitor for suspicious activity. This vulnerability highlights the risks of insufficient input validation in WordPress plugins, especially those that handle dynamic content execution.
Potential Impact
The impact of CVE-2024-13495 is significant for organizations running WordPress sites with the vulnerable GamiPress plugin. Successful exploitation allows attackers to execute arbitrary shortcodes, which can lead to remote code execution, data leakage, unauthorized privilege escalation, defacement, or site disruption. This compromises the confidentiality of sensitive user data, the integrity of website content and configurations, and the availability of the service. Attackers could leverage this vulnerability to implant backdoors, pivot within the network, or conduct further attacks such as phishing or malware distribution. Given WordPress's widespread use for business, e-commerce, and community sites, the vulnerability poses a broad threat surface. Organizations without timely mitigation risk reputational damage, regulatory penalties, and operational downtime. The unauthenticated nature of the exploit increases the likelihood of automated scanning and mass exploitation attempts, especially once public exploit code becomes available.
Mitigation Recommendations
To mitigate CVE-2024-13495, organizations should immediately update the GamiPress plugin to a patched version once released by the vendor. Until an official patch is available, administrators can implement the following specific measures: 1) Disable or restrict access to the AJAX endpoint gamipress_ajax_get_logs() via web application firewall (WAF) rules or server-level access controls to prevent unauthenticated requests. 2) Employ input validation and sanitization at the web server or plugin level to block suspicious shortcode patterns or unexpected parameters. 3) Monitor web server logs and WordPress activity logs for unusual shortcode execution or AJAX requests targeting the vulnerable function. 4) Limit plugin usage to trusted users and consider temporarily deactivating the plugin if the risk outweighs its benefits. 5) Harden WordPress security by disabling unnecessary shortcode execution or restricting shortcode capabilities through custom filters. 6) Use security plugins that detect and block code injection attempts. These targeted steps go beyond generic advice by focusing on the vulnerable function and attack vector, reducing exposure until a patch is applied.
Affected Countries
United States, India, Brazil, Germany, United Kingdom, Canada, Australia, France, Japan, Netherlands, Italy, Spain
CVE-2024-13495: CWE-94 Improper Control of Generation of Code ('Code Injection') in rubengc GamiPress – Gamification plugin to reward points, achievements, badges & ranks in WordPress
Description
CVE-2024-13495 is a high-severity vulnerability in the GamiPress WordPress plugin that allows unauthenticated attackers to execute arbitrary shortcodes via the gamipress_ajax_get_logs() function. This occurs because the plugin fails to properly validate input before passing it to the do_shortcode function, leading to code injection risks. Exploitation requires no authentication or user interaction and can impact confidentiality, integrity, and availability of affected WordPress sites. The vulnerability affects all versions up to and including 7. 2. 1. While no known exploits are currently reported in the wild, the ease of exploitation and broad impact make this a critical issue for websites using this plugin. Organizations should prioritize patching or applying mitigations to prevent potential compromise. Countries with large WordPress user bases and significant online presence are at higher risk. Immediate action is recommended to avoid unauthorized code execution and potential site takeover.
AI-Powered Analysis
Technical Analysis
CVE-2024-13495 is a code injection vulnerability classified under CWE-94 affecting the GamiPress – Gamification plugin for WordPress, which is widely used to reward points, achievements, badges, and ranks. The vulnerability arises from improper input validation in the gamipress_ajax_get_logs() function, which processes user-supplied data without adequate sanitization before invoking WordPress's do_shortcode function. This flaw enables unauthenticated attackers to inject and execute arbitrary shortcodes remotely, potentially leading to unauthorized code execution within the WordPress environment. Since shortcodes can execute PHP code or trigger other plugin functionality, this can compromise site confidentiality, integrity, and availability. The vulnerability affects all plugin versions up to 7.2.1, with no authentication or user interaction required for exploitation, making it highly accessible to attackers. Although no public exploits have been reported yet, the vulnerability's CVSS score of 7.3 (high) reflects its serious risk. The lack of official patches at the time of reporting increases the urgency for administrators to implement workarounds or monitor for suspicious activity. This vulnerability highlights the risks of insufficient input validation in WordPress plugins, especially those that handle dynamic content execution.
Potential Impact
The impact of CVE-2024-13495 is significant for organizations running WordPress sites with the vulnerable GamiPress plugin. Successful exploitation allows attackers to execute arbitrary shortcodes, which can lead to remote code execution, data leakage, unauthorized privilege escalation, defacement, or site disruption. This compromises the confidentiality of sensitive user data, the integrity of website content and configurations, and the availability of the service. Attackers could leverage this vulnerability to implant backdoors, pivot within the network, or conduct further attacks such as phishing or malware distribution. Given WordPress's widespread use for business, e-commerce, and community sites, the vulnerability poses a broad threat surface. Organizations without timely mitigation risk reputational damage, regulatory penalties, and operational downtime. The unauthenticated nature of the exploit increases the likelihood of automated scanning and mass exploitation attempts, especially once public exploit code becomes available.
Mitigation Recommendations
To mitigate CVE-2024-13495, organizations should immediately update the GamiPress plugin to a patched version once released by the vendor. Until an official patch is available, administrators can implement the following specific measures: 1) Disable or restrict access to the AJAX endpoint gamipress_ajax_get_logs() via web application firewall (WAF) rules or server-level access controls to prevent unauthenticated requests. 2) Employ input validation and sanitization at the web server or plugin level to block suspicious shortcode patterns or unexpected parameters. 3) Monitor web server logs and WordPress activity logs for unusual shortcode execution or AJAX requests targeting the vulnerable function. 4) Limit plugin usage to trusted users and consider temporarily deactivating the plugin if the risk outweighs its benefits. 5) Harden WordPress security by disabling unnecessary shortcode execution or restricting shortcode capabilities through custom filters. 6) Use security plugins that detect and block code injection attempts. These targeted steps go beyond generic advice by focusing on the vulnerable function and attack vector, reducing exposure until a patch is applied.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-16T20:24:24.435Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e5bb7ef31ef0b59ed6c
Added to database: 2/25/2026, 9:49:15 PM
Last enriched: 2/26/2026, 12:11:56 AM
Last updated: 2/26/2026, 6:11:09 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.