vulnerability
WordPress Plugin: gamipress: CVE-2024-11036: Improper Control of Generation of Code ('Code Injection')
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Nov 18, 2024 | May 15, 2025 | May 15, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Nov 18, 2024
Added
May 15, 2025
Modified
May 15, 2025
Description
The The GamiPress – The #1 gamification plugin to reward points, achievements, badges and ranks in WordPress plugin for WordPress is vulnerable to arbitrary shortcode execution via gamipress_get_user_earnings AJAX action in all versions up to, and including, 7.1.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
Solution
gamipress-plugin-cve-2024-11036

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.