The Game Users Share Buttons plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the ajaxDeleteTheme() function in all versions up to, and including, 1.3.0. This makes it possible for Subscriber-level attackers to add arbitrary file paths (such as ../../../../wp-config.php) to the themeNameId parameter of the AJAX request, which can lead to remote code execution.
References
Configurations
History
07 Jul 2025, 14:37
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:gameusers:game_users_share_button:*:*:*:*:*:wordpress:*:* | |
First Time |
Gameusers game Users Share Button
Gameusers |
|
References | () https://plugins.trac.wordpress.org/browser/game-users-share-buttons/tags/1.3.0/game-users-share-buttons.php#L638 - Product | |
References | () https://wordpress.org/plugins/game-users-share-buttons/#developers - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/f861ece5-21e4-4c7f-8701-bd9492b1b8bf?source=cve - Third Party Advisory |
30 Jun 2025, 18:38
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
28 Jun 2025, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-28 06:15
Updated : 2025-07-07 14:37
NVD link : CVE-2025-6755
Mitre link : CVE-2025-6755
CVE.ORG link : CVE-2025-6755
JSON object : View
Products Affected
gameusers
- game_users_share_button
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')