CVE-2025-5831

The Droip plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the make_google_font_offline() function in all versions up to, and including, 2.2.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Configurations

Configuration 1 (hide)

cpe:2.3:a:themeum:droip:*:*:*:*:*:wordpress:*:*

History

28 Jul 2025, 15:10

Type Values Removed Values Added
CPE cpe:2.3:a:themeum:droip:*:*:*:*:*:wordpress:*:*
First Time Themeum
Themeum droip
References () https://droip.com/ - () https://droip.com/ - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/dd129829-9682-4def-a07f-66f9178eeb77?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/dd129829-9682-4def-a07f-66f9178eeb77?source=cve - Third Party Advisory

25 Jul 2025, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-25 07:15

Updated : 2025-07-28 15:10


NVD link : CVE-2025-5831

Mitre link : CVE-2025-5831

CVE.ORG link : CVE-2025-5831


JSON object : View

Products Affected

themeum

  • droip
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type