CVE-2025-49326

| EUVD-2025-17246 HIGH
2025-06-06 [email protected]
7.6
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
Low

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 18:10 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 18:10 euvd
EUVD-2025-17246
CVE Published
Jun 06, 2025 - 13:15 nvd
HIGH 7.6

DescriptionNVD

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Ruben Garcia GamiPress allows SQL Injection. This issue affects GamiPress: from n/a through 7.4.5.

AnalysisAI

SQL Injection vulnerability in GamiPress (a WordPress gamification plugin) affecting versions through 7.4.5. An authenticated attacker with high privileges can execute arbitrary SQL commands to read sensitive database information, potentially compromising data confidentiality and availability. While the CVSS score is 7.6 (high), the attack requires high privileges and there is no public indication of active exploitation in the wild.

Technical ContextAI

GamiPress is a WordPress plugin that implements gamification features (points, badges, achievements) in WordPress installations. The vulnerability stems from improper neutralization of special characters in SQL queries (CWE-89), indicating that user-controllable input is concatenated directly into SQL commands without parameterized queries or escaping. The affected component likely processes achievement data, leaderboard queries, or user point calculations. WordPress plugins using direct SQL queries via $wpdb->query() or similar functions without proper prepared statements are susceptible to this class of vulnerability. The plugin architecture means the vulnerability affects any WordPress installation with GamiPress installed and activated.

RemediationAI

Update GamiPress to version 7.4.6 or later immediately (assumes patch released post-CVE discovery; verify current release). Mitigation steps: (1) Restrict WordPress admin/editor role access to trusted users only; (2) Disable GamiPress if not actively used until patched; (3) Implement Web Application Firewall (WAF) rules to detect SQL injection patterns in plugin endpoints (typically /wp-admin/admin-ajax.php with gamipress action parameters); (4) Enable WordPress security logging/auditing to monitor admin activity; (5) Regular database backups to recover from potential unauthorized access. Check the official GamiPress GitHub repository (github.com/rubengarciagarcia/gamipress) or WordPress.org plugin page for patch availability and release notes.

Share

CVE-2025-49326 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy