Cyber Posture

CVE-2025-7721

Critical

Published: 03 October 2025

Published
03 October 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0068 71.6th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-7721 is a Local File Inclusion (LFI) vulnerability, classified under CWE-98, affecting the JoomSport – for Sports: Team & League, Football, Hockey & more plugin for WordPress in all versions up to and including 5.7.3. The flaw resides in the handling of the 'task' parameter within the plugin's controller, specifically in the class-jsport-controller.php file around line 74, enabling the inclusion and execution of arbitrary .php files on the server. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for remote exploitation without authentication or user interaction.

Unauthenticated attackers can exploit this vulnerability over the network by manipulating the 'task' parameter to specify paths to arbitrary .php files, leading to their execution on the server. Successful exploitation allows attackers to execute PHP code from included files, bypassing access controls, accessing sensitive data, or achieving remote code execution (RCE) in scenarios where .php file uploads are possible elsewhere on the site.

Advisories from Wordfence detail the vulnerability in their threat intelligence report, while the WordPress plugin trac provides evidence of the fix in changeset 3371353, which patches the insecure file inclusion logic in the affected controller class. Security practitioners should update to a version beyond 5.7.3 and review server configurations to restrict file inclusion paths, as recommended by these sources.

Details

CWE(s)
CWE-98

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a critical unauthenticated LFI in a public-facing WordPress plugin, enabling remote exploitation for arbitrary PHP file inclusion and execution, directly mapping to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References