Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in mojoomla WPGYM allows SQL Injection. This issue affects WPGYM: from n/a through 65.0.
Published: 2025-07-16
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An attacker can inject crafted SQL payloads into inputs accepted by the WPGYM plugin because special characters are not properly escaped before being incorporated into database queries. The flaw permits execution of arbitrary SQL commands, which can lead to reading of sensitive data, alteration of database contents, or even removal of data. The description does not detail specific data that could be accessed, but SQL injection inherently grants the attacker the ability to manipulate the database at the owner’s discretion.

Affected Systems

WordPress installations that use the WPGYM plugin version 65.0 or earlier are impacted. The vulnerability is reported for all releases from the earliest to and including 65.0; therefore any site that has not upgraded past that version should be considered vulnerable.

Risk and Exploitability

The CVSS score of 8.5 indicates a high severity level. The EPSS score is below 1%, suggesting a low current exploitation probability, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is through web requests that send unsanitized input to the plugin’s interface, which may be accessible by authenticated users, site administrators, or guests who can manipulate plugin parameters. Successful exploitation would involve a crafted request that is executed as an SQL statement against the site’s database.

Generated by OpenCVE AI on May 2, 2026 at 08:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the WPGYM plugin to a version newer than 65.0 to apply the vendor patch that eliminates the injection flaw.
  • Restrict the plugin’s functionality to administrators only, or temporarily disable the plugin until a patched version is available, to limit the attack surface.
  • Monitor the WordPress database for unauthorized queries or anomalies and maintain recent backups to enable rapid recovery if compromise occurs.

Generated by OpenCVE AI on May 2, 2026 at 08:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-21617 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in mojoomla WPGYM allows SQL Injection. This issue affects WPGYM: from n/a through 65.0.
History

Tue, 28 Apr 2026 19:45:00 +0000


Tue, 28 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in mojoomla WPGYM gym-management allows SQL Injection.This issue affects WPGYM: from n/a through <= 65.0. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in mojoomla WPGYM allows SQL Injection. This issue affects WPGYM: from n/a through 65.0.
References

Thu, 23 Apr 2026 15:30:00 +0000


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in mojoomla WPGYM allows SQL Injection. This issue affects WPGYM: from n/a through 65.0. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in mojoomla WPGYM gym-management allows SQL Injection.This issue affects WPGYM: from n/a through <= 65.0.
References

Wed, 16 Jul 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00028}


Wed, 16 Jul 2025 11:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in mojoomla WPGYM allows SQL Injection. This issue affects WPGYM: from n/a through 65.0.
Title WordPress WPGYM plugin <= 65.0 - SQL Injection vulnerability
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:24.332Z

Reserved: 2025-04-09T11:20:09.347Z

Link: CVE-2025-32574

cve-icon Vulnrichment

Updated: 2025-07-16T18:48:14.734Z

cve-icon NVD

Status : Deferred

Published: 2025-07-16T12:15:26.320

Modified: 2026-04-28T19:31:43.773

Link: CVE-2025-32574

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T08:30:26Z

Weaknesses