CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L
Lifecycle Timeline
3DescriptionNVD
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Ruben Garcia GamiPress allows SQL Injection. This issue affects GamiPress: from n/a through 7.4.5.
AnalysisAI
SQL Injection vulnerability in GamiPress (a WordPress gamification plugin) affecting versions through 7.4.5. An authenticated attacker with high privileges can execute arbitrary SQL commands to read sensitive database information, potentially compromising data confidentiality and availability. While the CVSS score is 7.6 (high), the attack requires high privileges and there is no public indication of active exploitation in the wild.
Technical ContextAI
GamiPress is a WordPress plugin that implements gamification features (points, badges, achievements) in WordPress installations. The vulnerability stems from improper neutralization of special characters in SQL queries (CWE-89), indicating that user-controllable input is concatenated directly into SQL commands without parameterized queries or escaping. The affected component likely processes achievement data, leaderboard queries, or user point calculations. WordPress plugins using direct SQL queries via $wpdb->query() or similar functions without proper prepared statements are susceptible to this class of vulnerability. The plugin architecture means the vulnerability affects any WordPress installation with GamiPress installed and activated.
RemediationAI
Update GamiPress to version 7.4.6 or later immediately (assumes patch released post-CVE discovery; verify current release). Mitigation steps: (1) Restrict WordPress admin/editor role access to trusted users only; (2) Disable GamiPress if not actively used until patched; (3) Implement Web Application Firewall (WAF) rules to detect SQL injection patterns in plugin endpoints (typically /wp-admin/admin-ajax.php with gamipress action parameters); (4) Enable WordPress security logging/auditing to monitor admin activity; (5) Regular database backups to recover from potential unauthorized access. Check the official GamiPress GitHub repository (github.com/rubengarciagarcia/gamipress) or WordPress.org plugin page for patch availability and release notes.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17246