CVE-2025-32549: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in mojoomla WPGYM
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in mojoomla WPGYM allows PHP Local File Inclusion. This issue affects WPGYM: from n/a through 65.0.
AI Analysis
Technical Summary
CVE-2025-32549 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the mojoomla WPGYM plugin, a WordPress plugin designed for gym and fitness-related websites. The flaw allows for PHP Local File Inclusion (LFI), meaning an attacker can manipulate the filename parameter used in include or require statements to load arbitrary files from the local filesystem. This can lead to remote code execution if an attacker can include files containing malicious PHP code or sensitive information disclosure by including configuration or log files. The vulnerability is exploitable remotely over the network (AV:N), but requires low privileges (PR:L) and no user interaction (UI:N). However, the attack complexity is high (AC:H), indicating some conditions must be met for successful exploitation. The vulnerability impacts confidentiality, integrity, and availability (all rated high), making it a critical concern for affected systems. The affected versions are all versions up to 65.0, with no specific lower bound provided. No patches or known exploits in the wild are currently documented, but the presence of this vulnerability in a widely used WordPress plugin poses a significant risk if left unmitigated. The vulnerability was published on June 17, 2025, and is tracked under CVE-2025-32549.
Potential Impact
For European organizations, especially those operating fitness, health, or sports-related websites using WordPress with the WPGYM plugin, this vulnerability presents a substantial risk. Exploitation could lead to unauthorized disclosure of sensitive data such as user credentials, personal health information, or business-critical configuration files. Attackers could also execute arbitrary code on the web server, potentially leading to full system compromise, defacement, or use of the server as a pivot point for further attacks within the corporate network. Given the high confidentiality, integrity, and availability impacts, organizations could face data breaches, service outages, reputational damage, and regulatory penalties under GDPR if personal data is exposed. The requirement for low privileges and no user interaction lowers the barrier for attackers, increasing the likelihood of exploitation. The high attack complexity somewhat mitigates this risk but does not eliminate it, especially if attackers find ways to satisfy the conditions. The lack of known exploits in the wild currently provides a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
1. Immediate mitigation should include disabling or uninstalling the WPGYM plugin until a vendor patch is released. 2. Monitor official mojoomla channels and Patchstack for updates or patches addressing CVE-2025-32549 and apply them promptly. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious requests attempting to exploit file inclusion vulnerabilities, such as those containing directory traversal sequences or unusual include parameters. 4. Restrict PHP include paths and disable allow_url_include in the PHP configuration to prevent remote file inclusion vectors. 5. Conduct thorough code reviews and security audits of all custom or third-party WordPress plugins to identify similar insecure coding patterns. 6. Employ principle of least privilege on web server file permissions to limit the files accessible by the web application, reducing the impact of LFI. 7. Enable logging and alerting for unusual file access patterns or errors related to include/require statements to detect potential exploitation attempts early. 8. Educate site administrators on the risks of installing unverified plugins and encourage regular updates and security best practices.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Sweden, Poland
CVE-2025-32549: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in mojoomla WPGYM
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in mojoomla WPGYM allows PHP Local File Inclusion. This issue affects WPGYM: from n/a through 65.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-32549 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the mojoomla WPGYM plugin, a WordPress plugin designed for gym and fitness-related websites. The flaw allows for PHP Local File Inclusion (LFI), meaning an attacker can manipulate the filename parameter used in include or require statements to load arbitrary files from the local filesystem. This can lead to remote code execution if an attacker can include files containing malicious PHP code or sensitive information disclosure by including configuration or log files. The vulnerability is exploitable remotely over the network (AV:N), but requires low privileges (PR:L) and no user interaction (UI:N). However, the attack complexity is high (AC:H), indicating some conditions must be met for successful exploitation. The vulnerability impacts confidentiality, integrity, and availability (all rated high), making it a critical concern for affected systems. The affected versions are all versions up to 65.0, with no specific lower bound provided. No patches or known exploits in the wild are currently documented, but the presence of this vulnerability in a widely used WordPress plugin poses a significant risk if left unmitigated. The vulnerability was published on June 17, 2025, and is tracked under CVE-2025-32549.
Potential Impact
For European organizations, especially those operating fitness, health, or sports-related websites using WordPress with the WPGYM plugin, this vulnerability presents a substantial risk. Exploitation could lead to unauthorized disclosure of sensitive data such as user credentials, personal health information, or business-critical configuration files. Attackers could also execute arbitrary code on the web server, potentially leading to full system compromise, defacement, or use of the server as a pivot point for further attacks within the corporate network. Given the high confidentiality, integrity, and availability impacts, organizations could face data breaches, service outages, reputational damage, and regulatory penalties under GDPR if personal data is exposed. The requirement for low privileges and no user interaction lowers the barrier for attackers, increasing the likelihood of exploitation. The high attack complexity somewhat mitigates this risk but does not eliminate it, especially if attackers find ways to satisfy the conditions. The lack of known exploits in the wild currently provides a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
1. Immediate mitigation should include disabling or uninstalling the WPGYM plugin until a vendor patch is released. 2. Monitor official mojoomla channels and Patchstack for updates or patches addressing CVE-2025-32549 and apply them promptly. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious requests attempting to exploit file inclusion vulnerabilities, such as those containing directory traversal sequences or unusual include parameters. 4. Restrict PHP include paths and disable allow_url_include in the PHP configuration to prevent remote file inclusion vectors. 5. Conduct thorough code reviews and security audits of all custom or third-party WordPress plugins to identify similar insecure coding patterns. 6. Employ principle of least privilege on web server file permissions to limit the files accessible by the web application, reducing the impact of LFI. 7. Enable logging and alerting for unusual file access patterns or errors related to include/require statements to detect potential exploitation attempts early. 8. Educate site administrators on the risks of installing unverified plugins and encourage regular updates and security best practices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-04-09T11:19:56.431Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68518788a8c921274385dee3
Added to database: 6/17/2025, 3:19:36 PM
Last enriched: 6/17/2025, 4:09:05 PM
Last updated: 8/3/2025, 12:37:33 PM
Views: 15
Related Threats
CVE-2025-8927: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumCVE-2025-43988: n/a
CriticalCVE-2025-8926: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-43986: n/a
CriticalCVE-2025-43982: n/a
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.