Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 09 Sep 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 09 Sep 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bearsthemes
Bearsthemes goza Nonprofit Charity Wordpress Theme Wordpress Wordpress wordpress |
|
| Vendors & Products |
Bearsthemes
Bearsthemes goza Nonprofit Charity Wordpress Theme Wordpress Wordpress wordpress |
Tue, 09 Sep 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Goza - Nonprofit Charity WordPress Theme theme for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the alone_import_pack_restore_data() function in all versions up to, and including, 3.2.2. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). | |
| Title | Goza - Nonprofit Charity WordPress Theme <= 3.2.2 - Missing Authorization to Unauthenticated Arbitrary File Deletion | |
| Weaknesses | CWE-73 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-09-09T19:27:34.597Z
Reserved: 2025-09-08T20:03:24.392Z
Link: CVE-2025-10134
Updated: 2025-09-09T19:27:30.906Z
Status : Awaiting Analysis
Published: 2025-09-09T09:15:34.897
Modified: 2025-09-09T16:28:43.660
Link: CVE-2025-10134
No data.
OpenCVE Enrichment
Updated: 2025-09-09T21:31:34Z