First published: Tue Nov 19 2024(Updated: )
The The GamiPress – The #1 gamification plugin to reward points, achievements, badges & ranks in WordPress plugin for WordPress is vulnerable to arbitrary shortcode execution via gamipress_get_user_earnings AJAX action in all versions up to, and including, 7.1.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
GamiPress | <7.1.6 | |
openMairie Openpresse | <=7.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-11036 has a medium severity rating as it allows for arbitrary shortcode execution.
To fix CVE-2024-11036, update the GamiPress plugin to version 7.1.6 or later.
CVE-2024-11036 affects all versions of GamiPress up to and including 7.1.5.
Yes, the vulnerability is exploited via the gamipress_get_user_earnings AJAX action.
If left unaddressed, CVE-2024-11036 can allow attackers to execute arbitrary code on your WordPress site.