Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3671: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in dasinfomedia WPGYM - Wordpress Gym Management System

0
High
VulnerabilityCVE-2025-3671cvecve-2025-3671cwe-22
Published: Sat Aug 16 2025 (08/16/2025, 03:38:49 UTC)
Source: CVE Database V5
Vendor/Project: dasinfomedia
Product: WPGYM - Wordpress Gym Management System

Description

The WPGYM - Wordpress Gym Management System plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 67.7.0 via the 'page' parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. The Local File Inclusion exploit can be chained to include various dashboard view files in the plugin. One in particular reported by the researcher can be leveraged to update the password of Super Administrator accounts in Multisite environments making privilege escalation possible.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 13:45:25 UTC

Technical Analysis

The vulnerability CVE-2025-3671 in the WPGYM - WordPress Gym Management System plugin arises from improper limitation of pathname inputs (CWE-22), specifically in the 'page' parameter. This flaw enables Local File Inclusion (LFI), allowing authenticated users with Subscriber-level privileges or higher to include arbitrary files from the server. Because the plugin does not properly sanitize or restrict the 'page' parameter, attackers can execute arbitrary PHP code by including crafted files, even when only 'safe' file types like images are uploaded. This can lead to bypassing access controls, unauthorized data disclosure, and remote code execution. A notable exploitation path involves chaining the LFI to include dashboard view files, which can be leveraged to reset Super Administrator passwords in WordPress Multisite setups, facilitating privilege escalation. The vulnerability affects all plugin versions up to and including 67.7.0. The CVSS v3.1 score is 8.8, reflecting high impact on confidentiality, integrity, and availability with network attack vector, low attack complexity, and requiring only low privileges without user interaction. No patches are currently linked, and no public exploits have been reported yet, but the risk is significant given the potential for full system compromise.

Potential Impact

This vulnerability can have severe consequences for organizations using the WPGYM plugin. Attackers with minimal privileges can execute arbitrary code on the web server, potentially leading to full site compromise. This includes unauthorized access to sensitive customer data, manipulation or deletion of data, and disruption of service availability. In WordPress Multisite environments, the ability to reset Super Administrator passwords can lead to complete control over all sites in the network, amplifying the impact. The breach of confidentiality, integrity, and availability can damage organizational reputation, lead to regulatory penalties, and cause operational downtime. Since WordPress is widely used globally, and this plugin targets gym management systems which may hold personal and payment information, the threat extends to privacy violations and financial fraud risks. The ease of exploitation and lack of required user interaction increase the likelihood of targeted attacks and automated exploitation attempts.

Mitigation Recommendations

Immediate mitigation steps include restricting access to the vulnerable plugin by limiting Subscriber-level user capabilities or disabling the plugin if feasible until a patch is available. Implement strict input validation and sanitization on the 'page' parameter to prevent path traversal and LFI attacks. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the 'page' parameter with path traversal patterns. Monitor logs for unusual file inclusion attempts or privilege escalation activities. For WordPress Multisite environments, enforce strong password policies and consider multi-factor authentication for administrators to reduce the risk of account takeover. Regularly backup site data and configurations to enable recovery in case of compromise. Engage with the vendor or community to obtain or develop patches and apply them promptly once available. Additionally, consider isolating the web server environment and running plugins with least privilege to limit the impact of potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-04-15T22:04:45.953Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689fff64ad5a09ad0074397a

Added to database: 8/16/2025, 3:47:48 AM

Last enriched: 2/27/2026, 1:45:25 PM

Last updated: 3/26/2026, 12:17:01 AM

Views: 103

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses