The Droip plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the make_google_font_offline() function in all versions up to, and including, 2.2.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Metrics
Affected Vendors & Products
References
History
Fri, 25 Jul 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Themeum
Themeum droip Wordpress Wordpress wordpress |
|
Vendors & Products |
Themeum
Themeum droip Wordpress Wordpress wordpress |
Fri, 25 Jul 2025 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 25 Jul 2025 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Droip plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the make_google_font_offline() function in all versions up to, and including, 2.2.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. | |
Title | Droip <= 2.2.0 - Authenticated (Subscriber+) Arbitrary File Upload | |
Weaknesses | CWE-434 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-07-25T11:42:47.737Z
Reserved: 2025-06-06T19:39:29.622Z
Link: CVE-2025-5831

Updated: 2025-07-25T11:42:44.120Z

Status : Awaiting Analysis
Published: 2025-07-25T07:15:26.143
Modified: 2025-07-25T15:29:19.837
Link: CVE-2025-5831

No data.