The Game Users Share Buttons plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the ajaxDeleteTheme() function in all versions up to, and including, 1.3.0. This makes it possible for Subscriber-level attackers to add arbitrary file paths (such as ../../../../wp-config.php) to the themeNameId parameter of the AJAX request, which can lead to remote code execution.
Metrics
Affected Vendors & Products
References
History
Mon, 30 Jun 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 28 Jun 2025 05:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Game Users Share Buttons plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the ajaxDeleteTheme() function in all versions up to, and including, 1.3.0. This makes it possible for Subscriber-level attackers to add arbitrary file paths (such as ../../../../wp-config.php) to the themeNameId parameter of the AJAX request, which can lead to remote code execution. | |
Title | Game Users Share Buttons <= 1.3.0 - Authenticated (Subscriber+) Arbitrary File Deletion via themeNameId Parameter | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-06-28T05:29:51.899Z
Updated: 2025-06-30T18:32:53.491Z
Reserved: 2025-06-26T22:17:54.592Z
Link: CVE-2025-6755

Updated: 2025-06-30T18:32:50.116Z

Status : Awaiting Analysis
Published: 2025-06-28T06:15:23.910
Modified: 2025-06-30T18:38:23.493
Link: CVE-2025-6755

No data.