The Game Users Share Buttons plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the ajaxDeleteTheme() function in all versions up to, and including, 1.3.0. This makes it possible for Subscriber-level attackers to add arbitrary file paths (such as ../../../../wp-config.php) to the themeNameId parameter of the AJAX request, which can lead to remote code execution.
Metrics
Affected Vendors & Products
References
History
Mon, 07 Jul 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gameusers
Gameusers game Users Share Button |
|
CPEs | cpe:2.3:a:gameusers:game_users_share_button:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Gameusers
Gameusers game Users Share Button |
Mon, 30 Jun 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 28 Jun 2025 05:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Game Users Share Buttons plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the ajaxDeleteTheme() function in all versions up to, and including, 1.3.0. This makes it possible for Subscriber-level attackers to add arbitrary file paths (such as ../../../../wp-config.php) to the themeNameId parameter of the AJAX request, which can lead to remote code execution. | |
Title | Game Users Share Buttons <= 1.3.0 - Authenticated (Subscriber+) Arbitrary File Deletion via themeNameId Parameter | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-06-28T05:29:51.899Z
Updated: 2025-06-30T18:32:53.491Z
Reserved: 2025-06-26T22:17:54.592Z
Link: CVE-2025-6755

Updated: 2025-06-30T18:32:50.116Z

Status : Analyzed
Published: 2025-06-28T06:15:23.910
Modified: 2025-07-07T14:37:41.387
Link: CVE-2025-6755

No data.