CVE-2025-3671: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in dasinfomedia WPGYM - Wordpress Gym Management System
The WPGYM - Wordpress Gym Management System plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 67.7.0 via the 'page' parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. The Local File Inclusion exploit can be chained to include various dashboard view files in the plugin. One in particular reported by the researcher can be leveraged to update the password of Super Administrator accounts in Multisite environments making privilege escalation possible.
AI Analysis
Technical Summary
CVE-2025-3671 is a critical vulnerability classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory, commonly known as Path Traversal) affecting the WPGYM - Wordpress Gym Management System plugin developed by dasinfomedia. This vulnerability exists in all versions up to and including 67.7.0 of the plugin. The flaw resides in the handling of the 'page' parameter, which allows authenticated users with Subscriber-level access or higher to perform Local File Inclusion (LFI) attacks. Through this, attackers can include arbitrary files from the server and execute PHP code contained within those files. This capability enables attackers to bypass access controls, extract sensitive information, and execute arbitrary code on the server. Notably, the vulnerability can be exploited even when only “safe” file types such as images are uploaded, as these files can be included and executed via the LFI. Furthermore, the exploit can be chained to include various dashboard view files within the plugin. A particularly dangerous exploitation path involves updating the password of Super Administrator accounts in WordPress Multisite environments, thereby enabling privilege escalation to the highest administrative level. The vulnerability has a CVSS v3.1 score of 8.8, indicating high severity, with an attack vector that is network-based, low attack complexity, requiring only low privileges (Subscriber), no user interaction, and impacting confidentiality, integrity, and availability at a high level. Although no public exploits are currently known in the wild, the potential for damage is significant given the widespread use of WordPress and the plugin’s role in managing gym memberships and related data.
Potential Impact
For European organizations using the WPGYM plugin, this vulnerability poses a substantial risk. Successful exploitation could lead to unauthorized access to sensitive customer data, including personal and payment information, which would have severe privacy and regulatory implications under GDPR. The ability to escalate privileges to Super Administrator level in WordPress Multisite setups could allow attackers to control entire networks of sites, potentially disrupting business operations, defacing websites, or deploying malware. This could result in reputational damage, financial loss, and legal consequences. Given that gyms and fitness centers often handle membership and health-related data, the breach could also affect user trust and compliance with data protection laws. The vulnerability’s exploitation could also be used as a foothold for lateral movement within an organization’s IT infrastructure if the WordPress installation is integrated with other internal systems.
Mitigation Recommendations
Immediate mitigation steps include updating the WPGYM plugin to a patched version once released by dasinfomedia. Until a patch is available, organizations should restrict access to the WordPress admin dashboard to trusted IP addresses and enforce strong authentication mechanisms to limit the risk from low-privilege users. Implementing Web Application Firewalls (WAFs) with rules to detect and block path traversal attempts targeting the 'page' parameter can provide a temporary defense. Administrators should audit user roles and remove unnecessary Subscriber-level accounts or restrict their capabilities. Monitoring server logs for unusual file inclusion attempts and scanning for unauthorized file uploads is critical. For multisite environments, closely monitor Super Administrator account activities and consider additional hardening such as two-factor authentication. Regular backups and incident response plans should be in place to recover quickly if exploitation occurs. Finally, organizations should conduct security assessments of their WordPress environment to identify and remediate similar vulnerabilities.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Sweden, Poland
CVE-2025-3671: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in dasinfomedia WPGYM - Wordpress Gym Management System
Description
The WPGYM - Wordpress Gym Management System plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 67.7.0 via the 'page' parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. The Local File Inclusion exploit can be chained to include various dashboard view files in the plugin. One in particular reported by the researcher can be leveraged to update the password of Super Administrator accounts in Multisite environments making privilege escalation possible.
AI-Powered Analysis
Technical Analysis
CVE-2025-3671 is a critical vulnerability classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory, commonly known as Path Traversal) affecting the WPGYM - Wordpress Gym Management System plugin developed by dasinfomedia. This vulnerability exists in all versions up to and including 67.7.0 of the plugin. The flaw resides in the handling of the 'page' parameter, which allows authenticated users with Subscriber-level access or higher to perform Local File Inclusion (LFI) attacks. Through this, attackers can include arbitrary files from the server and execute PHP code contained within those files. This capability enables attackers to bypass access controls, extract sensitive information, and execute arbitrary code on the server. Notably, the vulnerability can be exploited even when only “safe” file types such as images are uploaded, as these files can be included and executed via the LFI. Furthermore, the exploit can be chained to include various dashboard view files within the plugin. A particularly dangerous exploitation path involves updating the password of Super Administrator accounts in WordPress Multisite environments, thereby enabling privilege escalation to the highest administrative level. The vulnerability has a CVSS v3.1 score of 8.8, indicating high severity, with an attack vector that is network-based, low attack complexity, requiring only low privileges (Subscriber), no user interaction, and impacting confidentiality, integrity, and availability at a high level. Although no public exploits are currently known in the wild, the potential for damage is significant given the widespread use of WordPress and the plugin’s role in managing gym memberships and related data.
Potential Impact
For European organizations using the WPGYM plugin, this vulnerability poses a substantial risk. Successful exploitation could lead to unauthorized access to sensitive customer data, including personal and payment information, which would have severe privacy and regulatory implications under GDPR. The ability to escalate privileges to Super Administrator level in WordPress Multisite setups could allow attackers to control entire networks of sites, potentially disrupting business operations, defacing websites, or deploying malware. This could result in reputational damage, financial loss, and legal consequences. Given that gyms and fitness centers often handle membership and health-related data, the breach could also affect user trust and compliance with data protection laws. The vulnerability’s exploitation could also be used as a foothold for lateral movement within an organization’s IT infrastructure if the WordPress installation is integrated with other internal systems.
Mitigation Recommendations
Immediate mitigation steps include updating the WPGYM plugin to a patched version once released by dasinfomedia. Until a patch is available, organizations should restrict access to the WordPress admin dashboard to trusted IP addresses and enforce strong authentication mechanisms to limit the risk from low-privilege users. Implementing Web Application Firewalls (WAFs) with rules to detect and block path traversal attempts targeting the 'page' parameter can provide a temporary defense. Administrators should audit user roles and remove unnecessary Subscriber-level accounts or restrict their capabilities. Monitoring server logs for unusual file inclusion attempts and scanning for unauthorized file uploads is critical. For multisite environments, closely monitor Super Administrator account activities and consider additional hardening such as two-factor authentication. Regular backups and incident response plans should be in place to recover quickly if exploitation occurs. Finally, organizations should conduct security assessments of their WordPress environment to identify and remediate similar vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-04-15T22:04:45.953Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689fff64ad5a09ad0074397a
Added to database: 8/16/2025, 3:47:48 AM
Last enriched: 8/24/2025, 1:00:39 AM
Last updated: 10/6/2025, 6:22:10 PM
Views: 40
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-57515: n/a
HighCVE-2025-11343: SQL Injection in code-projects Student Crud Operation
MediumCVE-2025-6985: CWE-611 Improper Restriction of XML External Entity Reference in langchain-ai langchain-ai/langchain
HighCVE-2025-28129: n/a
UnknownCVE-2025-11342: SQL Injection in code-projects Online Course Registration
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.