Skip to main content

CVE-2024-8245: CWE-352 Cross-Site Request Forgery (CSRF) in Unknown GamiPress

Medium
VulnerabilityCVE-2024-8245cvecve-2024-8245cwe-352
Published: Thu May 15 2025 (05/15/2025, 20:07:14 UTC)
Source: CVE
Vendor/Project: Unknown
Product: GamiPress

Description

The GamiPress WordPress plugin before 1.0.1 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack

AI-Powered Analysis

AILast updated: 07/04/2025, 15:41:16 UTC

Technical Analysis

CVE-2024-8245 is a medium-severity vulnerability affecting versions of the GamiPress WordPress plugin prior to 1.0.1. The vulnerability is classified as a Cross-Site Request Forgery (CSRF) issue (CWE-352). Specifically, the plugin lacks proper CSRF protections when updating its settings. This absence of CSRF checks allows an attacker to craft malicious requests that, when executed by a logged-in administrator, can change plugin settings without the administrator's consent or knowledge. The attack requires the victim to be authenticated with administrative privileges and to interact with a maliciously crafted webpage or link. The CVSS 3.1 base score is 4.3, reflecting a network attack vector with low complexity, no privileges required, but requiring user interaction and resulting in limited impact on integrity without affecting confidentiality or availability. The vulnerability does not appear to have known exploits in the wild at the time of publication. No patch links are provided, indicating that users should upgrade to version 1.0.1 or later once available or apply recommended mitigations. Since GamiPress is a WordPress plugin used to gamify websites by adding points, achievements, and ranks, the vulnerability could allow attackers to manipulate these settings, potentially undermining site integrity and user trust.

Potential Impact

For European organizations using WordPress sites with the GamiPress plugin, this vulnerability could lead to unauthorized changes in plugin configurations by attackers leveraging CSRF attacks. Although the direct impact is limited to integrity (e.g., altering gamification settings), such changes could disrupt user experience, damage brand reputation, or be leveraged as part of a broader attack chain. Since the attack requires an authenticated admin user to interact with malicious content, the risk is mitigated somewhat by user awareness and security hygiene. However, organizations with high administrative traffic or less stringent user training might be more vulnerable. The vulnerability does not compromise confidentiality or availability directly but could be used to facilitate further attacks or social engineering. Given the widespread use of WordPress in Europe, especially among SMEs and community sites, the impact could be significant in sectors relying on gamification for engagement or loyalty programs.

Mitigation Recommendations

European organizations should immediately verify the version of the GamiPress plugin in use and upgrade to version 1.0.1 or later once it is released, as this version addresses the CSRF vulnerability. Until an official patch is available, administrators should implement the following mitigations: 1) Restrict administrative access to trusted networks or VPNs to reduce exposure to CSRF attack vectors. 2) Employ web application firewalls (WAFs) with rules to detect and block suspicious CSRF attempts targeting WordPress admin endpoints. 3) Educate administrators to avoid clicking on untrusted links or visiting suspicious websites while logged into the WordPress admin panel. 4) Implement additional CSRF tokens or nonce verification mechanisms at the web server or plugin level if feasible. 5) Regularly audit plugin settings and logs for unauthorized changes. 6) Consider disabling or limiting the use of the GamiPress plugin if gamification is not critical to business operations until patched.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-08-27T19:46:16.265Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeb8eb

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/4/2025, 3:41:16 PM

Last updated: 8/11/2025, 9:11:05 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats