Vulnerability Description
The Droip plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the make_google_font_offline() function in all versions up to, and excluding, 2.5.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Themeum | Droip | <= 2.2.0 |
Related Weaknesses (CWE)
References
- https://droip.com/Product
- https://www.wordfence.com/threat-intel/vulnerabilities/id/dd129829-9682-4def-a07Third Party Advisory
FAQ
What is CVE-2025-5831?
CVE-2025-5831 is a vulnerability with a CVSS score of 8.8 (HIGH). The Droip plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the make_google_font_offline() function in all versions up to, and excluding, 2.5.2. This ...
How severe is CVE-2025-5831?
CVE-2025-5831 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-5831?
Check the references section above for vendor advisories and patch information. Affected products include: Themeum Droip.