CVE-2025-5835
Droip <= 2.2.6 - Missing Authorization to Authenticated (Subscriber+) Many Actions
CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th
The Droip plugin for WordPress is vulnerable to unauthorized modification and access of data due to a missing capability check on the droip_post_apis() function in all versions up to, and including, 2.2.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform many actions as the AJAX hooks to several functions. Some potential impacts include arbitrary post deletion, arbitrary post creation, post duplication, settings update, user manipulation, and much more.
| CWE | CWE-862 |
| Vendor | droip |
| Product | droip |
| Published | Jul 25, 2025 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for droip droip
Be the first to know when new high vulnerabilities affecting droip droip are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
Droip / Droip
0 โค 2.2.6
References
Credits
Friderika Baranyai