The Droip plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the make_google_font_offline() function in all versions up to, and including, 2.2.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
                
            References
                    | Link | Resource | 
|---|---|
| https://droip.com/ | Product | 
| https://www.wordfence.com/threat-intel/vulnerabilities/id/dd129829-9682-4def-a07f-66f9178eeb77?source=cve | Third Party Advisory | 
Configurations
                    History
                    28 Jul 2025, 15:10
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:themeum:droip:*:*:*:*:*:wordpress:*:* | |
| References | () https://droip.com/ - Product | |
| References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/dd129829-9682-4def-a07f-66f9178eeb77?source=cve - Third Party Advisory | |
| First Time | Themeum Themeum droip | 
25 Jul 2025, 07:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-07-25 07:15
Updated : 2025-07-28 15:10
NVD link : CVE-2025-5831
Mitre link : CVE-2025-5831
CVE.ORG link : CVE-2025-5831
JSON object : View
Products Affected
                themeum
- droip
CWE
                
                    
                        
                        CWE-434
                        
            Unrestricted Upload of File with Dangerous Type
