CVE-2024-1799
📋 TL;DR
This SQL injection vulnerability in the GamiPress WordPress plugin allows authenticated attackers with contributor-level access or higher to inject malicious SQL queries through the 'achievement_types' shortcode attribute. This can lead to unauthorized data extraction from the WordPress database, potentially exposing sensitive information like user credentials, personal data, or other confidential content stored in the database.
💻 Affected Systems
- GamiPress WordPress Plugin
📦 What is this software?
Gamipress by Gamipress
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data exfiltration, privilege escalation, or full site takeover through subsequent attacks.
Likely Case
Extraction of sensitive user data, plugin configuration details, or other database-stored information accessible via SQL queries.
If Mitigated
Limited impact if proper input validation and parameterized queries are implemented, restricting data access to authorized users only.
🎯 Exploit Status
Exploitation requires authenticated access (contributor or higher) and knowledge of SQL injection techniques.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.8.7
Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3051688%40gamipress&new=3051688%40gamipress&sfp_email=&sfph_mail=
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find GamiPress and click 'Update Now'. 4. Verify version is 6.8.7 or higher.
🔧 Temporary Workarounds
Disable Shortcode
allRemove or disable the gamipress_earnings shortcode usage across the site
Edit WordPress posts/pages to remove [gamipress_earnings] shortcode
Restrict User Roles
allTemporarily limit contributor-level access to trusted users only
Navigate to Users > All Users in WordPress admin and review contributor permissions
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block SQL injection patterns
- Restrict database user permissions to limit potential damage from successful exploitation
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Installed Plugins for GamiPress version 6.8.6 or lower
Check Version:
wp plugin list --name=gamipress --field=version (if WP-CLI installed)
Verify Fix Applied:
Confirm GamiPress version is 6.8.7 or higher in WordPress plugins list
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in WordPress/database logs
- Multiple failed login attempts followed by successful contributor login
Network Indicators:
- HTTP POST requests containing SQL injection patterns to WordPress pages
SIEM Query:
source="wordpress.log" AND "gamipress_earnings" AND ("UNION" OR "SELECT" OR "INSERT" OR "DELETE")
🔗 References
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3051688%40gamipress&new=3051688%40gamipress&sfp_email=&sfph_mail=
- https://www.wordfence.com/threat-intel/vulnerabilities/id/f357fe2a-aa24-42cd-ac2c-c948e18a4710?source=cve
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3051688%40gamipress&new=3051688%40gamipress&sfp_email=&sfph_mail=
- https://www.wordfence.com/threat-intel/vulnerabilities/id/f357fe2a-aa24-42cd-ac2c-c948e18a4710?source=cve