Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7442: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in dasinfomedia WPGYM - Wordpress Gym Management System

0
High
VulnerabilityCVE-2025-7442cvecve-2025-7442cwe-89
Published: Fri Jul 11 2025 (07/11/2025, 07:23:01 UTC)
Source: CVE Database V5
Vendor/Project: dasinfomedia
Product: WPGYM - Wordpress Gym Management System

Description

The WPGYM - Wordpress Gym Management System plugin for WordPress is vulnerable to SQL Injection via several parameters in the MJ_gmgt_delete_class_limit_for_member, MJ_gmgt_get_yearly_income_expense, MJ_gmgt_get_monthly_income_expense, MJ_gmgt_add_class_limit, MJ_gmgt_view_meeting_detail, and MJ_gmgt_create_meeting functions in all versions up to 67.8.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 16:14:01 UTC

Technical Analysis

CVE-2025-7442 is an SQL Injection vulnerability classified under CWE-89 that affects the WPGYM - Wordpress Gym Management System plugin for WordPress. This vulnerability exists in all versions up to 67.8.0 due to improper neutralization of special elements in SQL commands. Specifically, several functions—MJ_gmgt_delete_class_limit_for_member, MJ_gmgt_get_yearly_income_expense, MJ_gmgt_get_monthly_income_expense, MJ_gmgt_add_class_limit, MJ_gmgt_view_meeting_detail, and MJ_gmgt_create_meeting—fail to properly escape or prepare user-supplied parameters before incorporating them into SQL queries. This lack of input validation and parameterization enables unauthenticated attackers to append arbitrary SQL statements to existing queries. As a result, attackers can extract sensitive information from the backend database, such as user data or configuration details, without needing credentials or user interaction. The vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it highly accessible. The CVSS v3.1 score is 7.5 (high severity), reflecting the ease of exploitation and the impact on confidentiality. No patches or known exploits are currently documented, but the risk remains significant given the widespread use of WordPress and the plugin's functionality in managing gym-related data.

Potential Impact

The primary impact of CVE-2025-7442 is the unauthorized disclosure of sensitive information stored in the WordPress site's database. This can include personal data of gym members, payment records, scheduling information, and other confidential business data managed by the WPGYM plugin. Such data leakage can lead to privacy violations, regulatory non-compliance (e.g., GDPR), reputational damage, and potential financial loss. Since the vulnerability does not affect data integrity or availability directly, attackers cannot modify or delete data or cause denial of service through this flaw alone. However, the exposed information could be leveraged for further attacks, such as phishing, identity theft, or privilege escalation. Organizations worldwide using this plugin are at risk, especially those that have not implemented additional security controls or timely updates. The ease of exploitation without authentication increases the threat level, making automated scanning and mass exploitation plausible if exploit code becomes publicly available.

Mitigation Recommendations

1. Apply official patches or updates from dasinfomedia as soon as they are released to address the SQL Injection vulnerability. 2. In the absence of patches, implement a Web Application Firewall (WAF) with rules specifically designed to detect and block SQL Injection attempts targeting the vulnerable plugin functions. 3. Conduct a thorough code review and refactor the affected plugin functions to use parameterized queries or prepared statements, ensuring all user inputs are properly sanitized and escaped. 4. Restrict database user permissions to the minimum necessary, preventing excessive data exposure even if SQL Injection occurs. 5. Monitor web server and database logs for unusual query patterns or repeated access to the vulnerable endpoints. 6. Educate site administrators about the risks of using outdated plugins and encourage regular security audits. 7. Consider isolating the WordPress environment or using containerization to limit the blast radius of potential compromises. 8. Backup critical data regularly and verify restoration procedures to mitigate potential data loss from secondary attacks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-10T19:17:33.836Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6870bdbba83201eaacacf705

Added to database: 7/11/2025, 7:31:07 AM

Last enriched: 2/26/2026, 4:14:01 PM

Last updated: 3/24/2026, 5:00:11 PM

Views: 133

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses