CVE-2024-13499

7.3 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute arbitrary WordPress shortcodes through the GamiPress plugin. Attackers can potentially run malicious code, access sensitive data, or take over vulnerable WordPress sites. All WordPress installations using GamiPress versions up to 7.2.1 are affected.

💻 Affected Systems

Products:
  • GamiPress – Gamification plugin for WordPress
Versions: All versions up to and including 7.2.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with vulnerable GamiPress versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise through remote code execution, data theft, or defacement if attackers can execute privileged shortcodes or chain with other vulnerabilities.

🟠

Likely Case

Unauthenticated attackers execute arbitrary shortcodes to access sensitive information, modify content, or disrupt site functionality.

🟢

If Mitigated

Attackers can only execute limited shortcodes with minimal impact due to proper access controls and shortcode sanitization.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires knowledge of available shortcodes but is straightforward for attackers familiar with WordPress.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.2.2 or later

Vendor Advisory: https://wordpress.org/plugins/gamipress/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find GamiPress and click 'Update Now'. 4. Verify version is 7.2.2 or higher.

🔧 Temporary Workarounds

Disable GamiPress plugin

all

Temporarily deactivate the vulnerable plugin until patched

wp plugin deactivate gamipress

Restrict access to gamipress_do_shortcode function

all

Add authentication checks to prevent unauthenticated access

Add authentication checks in functions.php or via security plugin

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block requests containing suspicious shortcode patterns
  • Restrict plugin functionality to authenticated users only through access control mechanisms

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for GamiPress version 7.2.1 or lower

Check Version:

wp plugin get gamipress --field=version

Verify Fix Applied:

Confirm GamiPress version is 7.2.2 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to WordPress endpoints containing gamipress_do_shortcode parameters
  • Multiple failed shortcode execution attempts in WordPress debug logs

Network Indicators:

  • HTTP requests with suspicious shortcode parameters targeting WordPress sites

SIEM Query:

source="wordpress.log" AND ("gamipress_do_shortcode" OR "do_shortcode" WITH suspicious parameters)

🔗 References

📤 Share & Export