The Droip plugin for WordPress is vulnerable to unauthorized modification and access of data due to a missing capability check on the droip_post_apis() function in all versions up to, and including, 2.2.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform many actions as the AJAX hooks to several functions. Some potential impacts include arbitrary post deletion, arbitrary post creation, post duplication, settings update, user manipulation, and much more.
Metrics
Affected Vendors & Products
References
History
Fri, 25 Jul 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Themeum
Themeum droip Wordpress Wordpress wordpress |
|
Vendors & Products |
Themeum
Themeum droip Wordpress Wordpress wordpress |
Fri, 25 Jul 2025 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 25 Jul 2025 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Droip plugin for WordPress is vulnerable to unauthorized modification and access of data due to a missing capability check on the droip_post_apis() function in all versions up to, and including, 2.2.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform many actions as the AJAX hooks to several functions. Some potential impacts include arbitrary post deletion, arbitrary post creation, post duplication, settings update, user manipulation, and much more. | |
Title | Droip <= 2.2.0 - Missing Authorization to Authenticated (Subscriber+) Many Actions | |
Weaknesses | CWE-862 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-07-25T11:42:18.743Z
Reserved: 2025-06-06T19:42:06.965Z
Link: CVE-2025-5835

Updated: 2025-07-25T11:42:13.987Z

Status : Awaiting Analysis
Published: 2025-07-25T07:15:27.653
Modified: 2025-07-25T15:29:19.837
Link: CVE-2025-5835

No data.