Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6080: CWE-269 Improper Privilege Management in dasinfomedia WPGYM - Wordpress Gym Management System

0
High
VulnerabilityCVE-2025-6080cvecve-2025-6080cwe-269
Published: Sat Aug 16 2025 (08/16/2025, 03:38:50 UTC)
Source: CVE Database V5
Vendor/Project: dasinfomedia
Product: WPGYM - Wordpress Gym Management System

Description

The WPGYM - Wordpress Gym Management System plugin for WordPress is vulnerable to unauthorized admin account creation in all versions up to, and including, 67.7.0. This is due to the plugin not properly validating a user's capabilities prior to adding users. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create new users, including admins.

AI-Powered Analysis

AILast updated: 08/24/2025, 01:01:00 UTC

Technical Analysis

CVE-2025-6080 is a critical vulnerability affecting the WPGYM - Wordpress Gym Management System plugin developed by dasinfomedia. This plugin is widely used to manage gym memberships and related services on WordPress websites. The vulnerability arises from improper privilege management (CWE-269), where the plugin fails to correctly validate user capabilities before allowing user creation. Specifically, authenticated users with Subscriber-level access or higher can exploit this flaw to create new user accounts, including those with administrative privileges. This bypasses the intended access control mechanisms, enabling privilege escalation without requiring higher-level credentials or user interaction. The vulnerability affects all versions up to and including 67.7.0. The CVSS v3.1 base score is 8.8, indicating a high severity with network attack vector, low attack complexity, requiring low privileges, no user interaction, and impacting confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the ease of exploitation and the potential for complete site takeover make this a significant threat. Attackers gaining admin access can manipulate site content, steal sensitive data, deploy malware, or disrupt services, severely impacting the affected organizations.

Potential Impact

For European organizations using the WPGYM plugin, this vulnerability poses a substantial risk. Unauthorized admin account creation can lead to full site compromise, exposing customer data, including personal and payment information, which is subject to strict GDPR regulations. The breach of confidentiality and integrity can result in legal penalties, reputational damage, and financial losses. Additionally, attackers could deface websites, disrupt gym management operations, or use compromised sites as a foothold for further attacks within the organization's network. Given the plugin’s role in managing memberships and potentially payment processing, the impact on business continuity and customer trust is significant. Organizations in the fitness and wellness sector, especially those relying heavily on online membership management, are at heightened risk.

Mitigation Recommendations

Immediate mitigation steps include updating the WPGYM plugin to a patched version once available from dasinfomedia. Until a patch is released, organizations should restrict Subscriber-level user registrations or disable new user registrations entirely if feasible. Implementing strict monitoring and alerting for new user account creations, especially those with admin privileges, can help detect exploitation attempts early. Employing Web Application Firewalls (WAFs) with custom rules to block suspicious requests targeting user creation endpoints is advisable. Additionally, conducting regular audits of user accounts to identify unauthorized admin accounts is critical. Organizations should also enforce strong authentication mechanisms, such as multi-factor authentication (MFA), for all admin accounts to reduce the risk of account misuse. Finally, isolating WordPress instances and limiting their network access can reduce the blast radius of a potential compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-13T17:08:37.410Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689fff64ad5a09ad00743982

Added to database: 8/16/2025, 3:47:48 AM

Last enriched: 8/24/2025, 1:01:00 AM

Last updated: 10/6/2025, 10:21:33 PM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats