CVE-2025-6080: CWE-269 Improper Privilege Management in dasinfomedia WPGYM - Wordpress Gym Management System
The WPGYM - Wordpress Gym Management System plugin for WordPress is vulnerable to unauthorized admin account creation in all versions up to, and including, 67.7.0. This is due to the plugin not properly validating a user's capabilities prior to adding users. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create new users, including admins.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-6080 affects all versions of the dasinfomedia WPGYM - WordPress Gym Management System plugin up to and including version 67.7.0. The root cause is improper privilege management (CWE-269), where the plugin does not adequately validate a user's capabilities before permitting the creation of new user accounts. Specifically, authenticated users with Subscriber-level access or higher can exploit this flaw to create new users, including those with administrative privileges. This bypasses normal WordPress role-based access controls, enabling privilege escalation. The vulnerability has a CVSS 3.1 base score of 8.8, reflecting its high impact on confidentiality, integrity, and availability, as well as its low attack complexity and lack of required user interaction. The flaw allows attackers to gain full control over the affected WordPress site, potentially leading to data theft, site defacement, or further malware deployment. Although no known exploits are currently in the wild, the vulnerability's nature and ease of exploitation make it a significant threat. The vulnerability was publicly disclosed on August 16, 2025, with no official patches yet available, increasing the urgency for mitigation measures.
Potential Impact
The impact of CVE-2025-6080 is severe for organizations using the WPGYM plugin on WordPress sites. Successful exploitation grants attackers administrative privileges, enabling complete control over the website. This can lead to unauthorized data access, modification, or deletion, including sensitive customer and business data. Attackers could also install backdoors, deface websites, or use the compromised site as a launchpad for further attacks within the organization's network. The availability of the site could be disrupted through malicious actions by the attacker. Given the popularity of WordPress and the niche use of WPGYM in gym and fitness businesses, the threat could affect a wide range of organizations, from small gyms to large fitness chains, potentially damaging reputation and causing financial loss. The lack of required user interaction and low complexity of exploitation increase the risk of widespread abuse once exploit code becomes available.
Mitigation Recommendations
Until an official patch is released, organizations should implement several specific mitigations: 1) Restrict user registrations and roles strictly, ensuring that only trusted users have Subscriber-level or higher access. 2) Employ WordPress security plugins that monitor and alert on new user creation, especially for admin accounts. 3) Disable or limit the WPGYM plugin's user management features if possible, or temporarily deactivate the plugin if it is not critical. 4) Implement web application firewall (WAF) rules to detect and block suspicious requests related to user creation endpoints in WPGYM. 5) Conduct regular audits of user accounts to identify and remove unauthorized users promptly. 6) Monitor logs for unusual activity patterns indicative of exploitation attempts. 7) Prepare to apply patches immediately once they are released by dasinfomedia. 8) Educate site administrators about the vulnerability and the importance of least privilege principles.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, France, India, Brazil, Japan, South Africa
CVE-2025-6080: CWE-269 Improper Privilege Management in dasinfomedia WPGYM - Wordpress Gym Management System
Description
The WPGYM - Wordpress Gym Management System plugin for WordPress is vulnerable to unauthorized admin account creation in all versions up to, and including, 67.7.0. This is due to the plugin not properly validating a user's capabilities prior to adding users. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create new users, including admins.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2025-6080 affects all versions of the dasinfomedia WPGYM - WordPress Gym Management System plugin up to and including version 67.7.0. The root cause is improper privilege management (CWE-269), where the plugin does not adequately validate a user's capabilities before permitting the creation of new user accounts. Specifically, authenticated users with Subscriber-level access or higher can exploit this flaw to create new users, including those with administrative privileges. This bypasses normal WordPress role-based access controls, enabling privilege escalation. The vulnerability has a CVSS 3.1 base score of 8.8, reflecting its high impact on confidentiality, integrity, and availability, as well as its low attack complexity and lack of required user interaction. The flaw allows attackers to gain full control over the affected WordPress site, potentially leading to data theft, site defacement, or further malware deployment. Although no known exploits are currently in the wild, the vulnerability's nature and ease of exploitation make it a significant threat. The vulnerability was publicly disclosed on August 16, 2025, with no official patches yet available, increasing the urgency for mitigation measures.
Potential Impact
The impact of CVE-2025-6080 is severe for organizations using the WPGYM plugin on WordPress sites. Successful exploitation grants attackers administrative privileges, enabling complete control over the website. This can lead to unauthorized data access, modification, or deletion, including sensitive customer and business data. Attackers could also install backdoors, deface websites, or use the compromised site as a launchpad for further attacks within the organization's network. The availability of the site could be disrupted through malicious actions by the attacker. Given the popularity of WordPress and the niche use of WPGYM in gym and fitness businesses, the threat could affect a wide range of organizations, from small gyms to large fitness chains, potentially damaging reputation and causing financial loss. The lack of required user interaction and low complexity of exploitation increase the risk of widespread abuse once exploit code becomes available.
Mitigation Recommendations
Until an official patch is released, organizations should implement several specific mitigations: 1) Restrict user registrations and roles strictly, ensuring that only trusted users have Subscriber-level or higher access. 2) Employ WordPress security plugins that monitor and alert on new user creation, especially for admin accounts. 3) Disable or limit the WPGYM plugin's user management features if possible, or temporarily deactivate the plugin if it is not critical. 4) Implement web application firewall (WAF) rules to detect and block suspicious requests related to user creation endpoints in WPGYM. 5) Conduct regular audits of user accounts to identify and remove unauthorized users promptly. 6) Monitor logs for unusual activity patterns indicative of exploitation attempts. 7) Prepare to apply patches immediately once they are released by dasinfomedia. 8) Educate site administrators about the vulnerability and the importance of least privilege principles.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-13T17:08:37.410Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689fff64ad5a09ad00743982
Added to database: 8/16/2025, 3:47:48 AM
Last enriched: 2/27/2026, 4:03:04 PM
Last updated: 3/24/2026, 3:10:08 PM
Views: 110
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.