Overview
The WPGYM – WordPress Gym Management System plugin, widely used by businesses in the health and fitness sector, is vulnerable to an SQL Injection attack in versions up to 67.8.0. This vulnerability can potentially compromise the system and lead to sensitive data leakage. Timely mitigation is crucial to prevent unauthorized access.
Vulnerability Summary
CVE ID: CVE-2025-7442
Severity: High (7.5 CVSS score)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: System compromise and potential data leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
WPGYM – WordPress Gym Management System | Up to 67.8.0
How the Exploit Works
The vulnerability arises from insufficient escaping on user-supplied parameters and lack of adequate preparation in the SQL query in multiple functions of the plugin. As a result, unauthenticated attackers can append additional SQL queries into already existing queries, allowing them to extract sensitive information from the database.
Conceptual Example Code
The following is a conceptual HTTP POST request that demonstrates how an attacker might exploit the vulnerability:
POST /MJ_gmgt_delete_class_limit_for_member HTTP/1.1
Host: target.example.com
Content-Type: application/x-www-form-urlencoded
class_id=1; DROP TABLE users;--
In this example, the attacker appends a `DROP TABLE` SQL command to the `class_id` parameter, causing the database to delete the users table.
Mitigation
Users are advised to apply the latest patch provided by the vendor. If a patch is not immediately available, a Web Application Firewall (WAF) or Intrusion Detection System (IDS) could offer temporary mitigation to the vulnerability.

