Skip to main content

CVE-2025-7049: CWE-639 Authorization Bypass Through User-Controlled Key in dasinfomedia WPGYM - Wordpress Gym Management System

High
VulnerabilityCVE-2025-7049cvecve-2025-7049cwe-639
Published: Wed Sep 10 2025 (09/10/2025, 06:38:45 UTC)
Source: CVE Database V5
Vendor/Project: dasinfomedia
Product: WPGYM - Wordpress Gym Management System

Description

The WPGYM - Wordpress Gym Management System plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 67.7.0 via the 'MJ_gmgt_gmgt_add_user' function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change the email, password, and other details of any user, including Administrator users.

AI-Powered Analysis

AILast updated: 09/10/2025, 07:00:14 UTC

Technical Analysis

CVE-2025-7049 is a critical vulnerability affecting the WPGYM - Wordpress Gym Management System plugin developed by dasinfomedia. This plugin is widely used to manage gym memberships and related user data within WordPress environments. The vulnerability lies in the 'MJ_gmgt_gmgt_add_user' function, where there is a missing validation on a user-controlled key parameter. This flaw allows an authenticated attacker with as low as Subscriber-level privileges to escalate their privileges significantly. Specifically, the attacker can manipulate this key to modify sensitive user information such as email addresses, passwords, and other account details of any user, including those with Administrator privileges. The vulnerability is classified under CWE-639, which refers to authorization bypass through user-controlled keys, indicating improper access control checks. The CVSS v3.1 base score of 8.8 reflects the high severity, with an attack vector over the network, low attack complexity, requiring low privileges but no user interaction, and impacting confidentiality, integrity, and availability at a high level. Although no known exploits are reported in the wild yet, the ease of exploitation and the potential impact make this a significant threat. Since all versions up to and including 67.7.0 are affected, any deployment using these versions is vulnerable. The absence of a patch link suggests that a fix may not yet be publicly available, increasing the urgency for mitigation.

Potential Impact

For European organizations, especially those operating gyms, fitness centers, or wellness platforms using WordPress with the WPGYM plugin, this vulnerability poses a severe risk. Successful exploitation can lead to unauthorized access to administrator accounts, enabling attackers to take full control over the WordPress site. This can result in data breaches involving personal user information, including emails and passwords, potentially violating GDPR regulations and leading to legal and financial penalties. Furthermore, attackers could disrupt service availability by locking out legitimate administrators or injecting malicious content, damaging organizational reputation. Given the interconnected nature of many European businesses and the reliance on digital platforms for customer engagement, such a compromise could have cascading effects on business continuity and customer trust. The high severity and ease of exploitation mean that even less sophisticated attackers could leverage this vulnerability, increasing the threat landscape for European entities.

Mitigation Recommendations

Immediate mitigation steps include restricting access to the WordPress admin and subscriber roles by implementing strict role-based access controls and monitoring for unusual account changes. Organizations should audit user activity logs to detect unauthorized modifications to user accounts. Until an official patch is released, consider temporarily disabling or uninstalling the WPGYM plugin if feasible. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable function, especially those attempting to manipulate user keys. Additionally, enforce strong password policies and multi-factor authentication (MFA) for all administrative accounts to reduce the risk of account takeover. Regular backups of the WordPress site and database should be maintained to enable recovery in case of compromise. Finally, organizations should stay alert for updates from the vendor and apply patches promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-03T16:00:51.048Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c11e7de55cc6e90d9f3b65

Added to database: 9/10/2025, 6:45:17 AM

Last enriched: 9/10/2025, 7:00:14 AM

Last updated: 9/10/2025, 8:29:01 PM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats