CVE-2024-11036
📋 TL;DR
This vulnerability allows unauthenticated attackers to execute arbitrary WordPress shortcodes via the gamipress_get_user_earnings AJAX action. All WordPress sites using GamiPress plugin versions up to 7.1.5 are affected, potentially leading to privilege escalation, data exposure, or remote code execution.
💻 Affected Systems
- GamiPress WordPress Plugin
📦 What is this software?
Gamipress by Gamipress
⚠️ Risk & Real-World Impact
Worst Case
Attackers could execute arbitrary PHP code through shortcodes, leading to complete site compromise, data theft, or server takeover.
Likely Case
Attackers execute existing shortcodes to access sensitive data, modify content, or escalate privileges to administrator.
If Mitigated
If shortcode execution is restricted via security plugins or hardening, impact limited to non-critical shortcode execution.
🎯 Exploit Status
Exploitation requires sending crafted AJAX requests to vulnerable endpoints. No authentication needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 7.1.6 or later
Vendor Advisory: https://wordpress.org/plugins/gamipress/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find GamiPress and click 'Update Now'. 4. Verify version is 7.1.6 or higher.
🔧 Temporary Workarounds
Disable AJAX endpoint via .htaccess
linuxBlock access to the vulnerable AJAX endpoint
RewriteEngine On
RewriteRule ^wp-admin/admin-ajax\.php\?action=gamipress_get_user_earnings - [F,L]
Temporarily disable plugin
allDeactivate GamiPress until patched
wp plugin deactivate gamipress
🧯 If You Can't Patch
- Implement Web Application Firewall (WAF) rules to block requests containing 'gamipress_get_user_earnings' action parameter
- Restrict AJAX endpoints to authenticated users only via security plugins
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin > Plugins > Installed Plugins for GamiPress version 7.1.5 or lower
Check Version:
wp plugin list --name=gamipress --field=version
Verify Fix Applied:
Confirm GamiPress version is 7.1.6 or higher in WordPress plugins list
📡 Detection & Monitoring
Log Indicators:
- POST requests to /wp-admin/admin-ajax.php with action=gamipress_get_user_earnings
- Unusual shortcode execution in WordPress debug logs
Network Indicators:
- HTTP POST requests to admin-ajax.php with gamipress_get_user_earnings parameter from unauthenticated sources
SIEM Query:
source="wordpress.log" AND "admin-ajax.php" AND "gamipress_get_user_earnings"
🔗 References
- https://plugins.trac.wordpress.org/browser/gamipress/
- https://plugins.trac.wordpress.org/browser/gamipress/tags/7.1.4/includes/functions.php#L693
- https://plugins.trac.wordpress.org/browser/gamipress/tags/7.1.4/includes/functions.php#L702
- https://wordpress.org/plugins/gamipress/#developers
- https://www.wordfence.com/threat-intel/vulnerabilities/id/bad0cd3f-88ea-4a1d-b400-0a450b07a546?source=cve