CVE-2025-10134
BaseFortify
Publication date: 2025-09-09
Last updated on: 2025-09-09
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| goza | nonprofit_charity_wordpress_theme | 3.2.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-73 | The product allows user input to control or influence paths or file names that are used in filesystem operations. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability exists in the Goza - Nonprofit Charity WordPress Theme up to version 3.2.2, where insufficient file path validation in the alone_import_pack_restore_data() function allows unauthenticated attackers to delete arbitrary files on the server. This can lead to serious consequences such as remote code execution if critical files like wp-config.php are deleted.
How can this vulnerability impact me? :
This vulnerability can allow attackers to delete important files on your server without authentication, potentially leading to remote code execution. This means attackers could take control of your server, disrupt your website, or compromise your data and services.