CVE-2025-7721

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to perform Local File Inclusion (LFI) in the JoomSport WordPress plugin, enabling them to include and execute arbitrary PHP files on the server. This can lead to remote code execution, data theft, and access control bypass. All WordPress sites using JoomSport plugin versions up to 5.7.3 are affected.

💻 Affected Systems

Products:
  • JoomSport – for Sports: Team & League, Football, Hockey & more WordPress plugin
Versions: All versions up to and including 5.7.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin activated. No authentication required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise via remote code execution, leading to data exfiltration, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Unauthenticated attackers execute arbitrary PHP code to deface websites, steal sensitive data, or install cryptocurrency miners.

🟢

If Mitigated

Attackers can still probe for vulnerable systems but cannot execute code due to proper file upload restrictions and server hardening.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward via crafted HTTP requests to the vulnerable task parameter. Public proof-of-concept code exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.7.4

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3371353/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find JoomSport plugin and update to version 5.7.4 or later. 4. Verify update completes successfully.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the JoomSport plugin until patched

wp plugin deactivate joomsport-sports-league-results-management

Web Application Firewall rule

all

Block requests containing malicious task parameter patterns

Add WAF rule: Block if request_uri contains 'task=' and matches LFI patterns

🧯 If You Can't Patch

  • Implement strict file upload restrictions to prevent PHP file uploads
  • Use web application firewall with LFI protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → JoomSport version. If version ≤5.7.3, system is vulnerable.

Check Version:

wp plugin get joomsport-sports-league-results-management --field=version

Verify Fix Applied:

Confirm JoomSport plugin version is 5.7.4 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with task parameter containing file paths (e.g., task=../../../etc/passwd)
  • Multiple failed LFI attempts in web server logs

Network Indicators:

  • Unusual outbound connections from web server after LFI exploitation
  • HTTP requests with task parameter and PHP file extensions

SIEM Query:

source="web_logs" AND (uri="*task=*" AND (uri="*../*" OR uri="*.php*"))

🔗 References

📤 Share & Export