CVE-2025-7721
BaseFortify
Publication date: 2025-10-03
Last updated on: 2025-10-06
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordpress | wordpress | * |
| joomsport | joomsport-sports-league-results-management | 5.7.4 |
| joomsport | joomsport-sports-league-results-management | 5.7.3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-98 | The PHP application receives input from an upstream component, but it does not restrict or incorrectly restricts the input before its usage in "require," "include," or similar functions. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Local File Inclusion (LFI) issue in the JoomSport plugin for WordPress (versions up to 5.7.3). It allows unauthenticated attackers to use the 'task' parameter to include and execute arbitrary PHP files on the server. This means attackers can run any PHP code they upload or access, potentially bypassing access controls and compromising the server.
How can this vulnerability impact me? :
The vulnerability can lead to severe impacts including unauthorized code execution on the server, bypassing access controls, and exposure of sensitive data. Attackers can execute arbitrary PHP code, which may result in full system compromise, data theft, or disruption of services.