CVE-2025-2780: CWE-434 Unrestricted Upload of File with Dangerous Type in WofficeIO Woffice Core
The Woffice Core plugin for WordPress, used by the Woffice Theme, is vulnerable to arbitrary file uploads due to missing file type validation in the 'saveFeaturedImage' function in all versions up to, and including, 5.4.21. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
AI Analysis
Technical Summary
CVE-2025-2780 is a critical vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the Woffice Core plugin for WordPress, which is bundled with the Woffice theme. The vulnerability arises from inadequate validation of uploaded file types in the 'saveFeaturedImage' function, allowing authenticated users with as low as Subscriber-level privileges to upload arbitrary files to the server. Since WordPress Subscriber roles typically have minimal permissions, this vulnerability significantly lowers the bar for exploitation. Uploaded files could include malicious scripts or webshells, potentially enabling remote code execution (RCE) on the hosting server. The vulnerability affects all versions up to and including 5.4.21 of the plugin. The CVSS v3.1 score of 8.8 reflects the ease of exploitation (network attack vector, low attack complexity, privileges required but low-level, no user interaction) and the severe impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability's nature and severity make it a prime target for attackers seeking to compromise WordPress sites using the Woffice theme. The lack of patch links suggests that a fix may not yet be publicly available, increasing urgency for mitigation. The vulnerability's exploitation could lead to full site compromise, data theft, defacement, or use of the server as a pivot point for further attacks.
Potential Impact
The impact of CVE-2025-2780 is substantial for organizations running WordPress sites with the Woffice theme and its Core plugin. Successful exploitation allows attackers to upload arbitrary files, including malicious scripts, leading to remote code execution. This can result in complete site takeover, data breaches involving sensitive user or organizational data, defacement, and disruption of services. Attackers could also use compromised servers to launch further attacks within the network or as part of botnets. Since the vulnerability requires only Subscriber-level authentication, attackers can exploit it by creating low-privilege accounts or compromising existing ones, increasing the attack surface. The widespread use of WordPress globally and the popularity of the Woffice theme in corporate intranets, educational institutions, and community portals amplify the potential reach and damage. Organizations may face reputational damage, regulatory penalties, and operational downtime if exploited.
Mitigation Recommendations
To mitigate CVE-2025-2780, organizations should immediately audit their WordPress installations for the presence of the Woffice Core plugin and verify the version in use. Until an official patch is released, implement strict server-side validation to restrict uploaded file types to safe formats (e.g., images only) and reject any executable or script files. Employ web application firewalls (WAFs) with rules to detect and block suspicious file uploads and webshell signatures. Restrict user roles and permissions rigorously, ensuring that only trusted users have upload capabilities. Monitor server logs and file system changes for unusual activity indicative of exploitation attempts. Consider disabling the 'saveFeaturedImage' functionality if feasible or replacing it with a secure alternative. Regularly back up website data and test restoration procedures to minimize impact from potential compromises. Stay alert for vendor updates and apply patches promptly once available.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, India, Brazil, Netherlands, Japan, South Korea, Italy, Spain
CVE-2025-2780: CWE-434 Unrestricted Upload of File with Dangerous Type in WofficeIO Woffice Core
Description
The Woffice Core plugin for WordPress, used by the Woffice Theme, is vulnerable to arbitrary file uploads due to missing file type validation in the 'saveFeaturedImage' function in all versions up to, and including, 5.4.21. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-2780 is a critical vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the Woffice Core plugin for WordPress, which is bundled with the Woffice theme. The vulnerability arises from inadequate validation of uploaded file types in the 'saveFeaturedImage' function, allowing authenticated users with as low as Subscriber-level privileges to upload arbitrary files to the server. Since WordPress Subscriber roles typically have minimal permissions, this vulnerability significantly lowers the bar for exploitation. Uploaded files could include malicious scripts or webshells, potentially enabling remote code execution (RCE) on the hosting server. The vulnerability affects all versions up to and including 5.4.21 of the plugin. The CVSS v3.1 score of 8.8 reflects the ease of exploitation (network attack vector, low attack complexity, privileges required but low-level, no user interaction) and the severe impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability's nature and severity make it a prime target for attackers seeking to compromise WordPress sites using the Woffice theme. The lack of patch links suggests that a fix may not yet be publicly available, increasing urgency for mitigation. The vulnerability's exploitation could lead to full site compromise, data theft, defacement, or use of the server as a pivot point for further attacks.
Potential Impact
The impact of CVE-2025-2780 is substantial for organizations running WordPress sites with the Woffice theme and its Core plugin. Successful exploitation allows attackers to upload arbitrary files, including malicious scripts, leading to remote code execution. This can result in complete site takeover, data breaches involving sensitive user or organizational data, defacement, and disruption of services. Attackers could also use compromised servers to launch further attacks within the network or as part of botnets. Since the vulnerability requires only Subscriber-level authentication, attackers can exploit it by creating low-privilege accounts or compromising existing ones, increasing the attack surface. The widespread use of WordPress globally and the popularity of the Woffice theme in corporate intranets, educational institutions, and community portals amplify the potential reach and damage. Organizations may face reputational damage, regulatory penalties, and operational downtime if exploited.
Mitigation Recommendations
To mitigate CVE-2025-2780, organizations should immediately audit their WordPress installations for the presence of the Woffice Core plugin and verify the version in use. Until an official patch is released, implement strict server-side validation to restrict uploaded file types to safe formats (e.g., images only) and reject any executable or script files. Employ web application firewalls (WAFs) with rules to detect and block suspicious file uploads and webshell signatures. Restrict user roles and permissions rigorously, ensuring that only trusted users have upload capabilities. Monitor server logs and file system changes for unusual activity indicative of exploitation attempts. Consider disabling the 'saveFeaturedImage' functionality if feasible or replacing it with a secure alternative. Regularly back up website data and test restoration procedures to minimize impact from potential compromises. Stay alert for vendor updates and apply patches promptly once available.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-03-24T22:52:01.711Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68487f5a1b0bd07c3938b49a
Added to database: 6/10/2025, 6:54:18 PM
Last enriched: 2/27/2026, 1:00:11 PM
Last updated: 3/28/2026, 9:19:06 AM
Views: 60
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.