- Description
- The Woffice Core plugin for WordPress, used by the Woffice Theme, is vulnerable to arbitrary file uploads due to missing file type validation in the 'saveFeaturedImage' function in all versions up to, and including, 5.4.21. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
- Source
- security@wordfence.com
- NVD status
- Received
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- security@wordfence.com
- CWE-434
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
1
๐จ CVE-2025-2780 โ ๏ธ๐ด CRITICAL (9.8) ๐ข WofficeIO - Woffice Core ๐๏ธ * ๐ https://t.co/m13JO1sdzs ๐ http://localhost:1337/wp-content/plugins/woffice-core/extensions/woffice-event/class-fw-extension-woffice-event.php#L1235 ๐ https://t.co/FeMeMSusEW #CyberCron #VulnAlert #InfoSec
@cybercronai
4 Apr 2025
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-2780 The Woffice Core plugin for WordPress, used by the Woffice Theme, is vulnerable to arbitrary file uploads due to missing file type validation in the 'saveFeaturedImage'โฆ https://t.co/PDn3ozYneY
@CVEnew
4 Apr 2025
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-2780: CRITICAL] Woffice Core plugin for WordPress is vulnerable to arbitrary file uploads allowing attackers with Subscriber-level access to upload files, potentially enabling remote code execution.#cybersecurity,#vulnerability https://t.co/nCa6v0eLth https://t.co/m4wbK
@CveFindCom
4 Apr 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes