First published: Wed Jan 22 2025(Updated: )
The The GamiPress – Gamification plugin to reward points, achievements, badges & ranks in WordPress plugin for WordPress is vulnerable to arbitrary shortcode execution via the gamipress_ajax_get_logs() function in all versions up to, and including, 7.2.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
GamiPress | <7.2.2 | |
openMairie Openpresse | <=7.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13495 has a high severity rating due to its potential for arbitrary shortcode execution.
To fix CVE-2024-13495, update the GamiPress plugin to version 7.2.2 or later.
Anyone using the GamiPress plugin for WordPress versions up to and including 7.2.1 is affected by CVE-2024-13495.
CVE-2024-13495 impacts the gamipress_ajax_get_logs() function, allowing arbitrary shortcode execution.
No, CVE-2024-13495 is not present in versions after 7.2.1, specifically starting from version 7.2.2.