Skip to main content

CVE-2025-10412: CWE-434 Unrestricted Upload of File with Dangerous Type in MooMoo Product Options and Price Calculation Formulas for WooCommerce – Uni CPO (Premium)

Critical
VulnerabilityCVE-2025-10412cvecve-2025-10412cwe-434
Published: Tue Sep 23 2025 (09/23/2025, 09:25:56 UTC)
Source: CVE Database V5
Vendor/Project: MooMoo
Product: Product Options and Price Calculation Formulas for WooCommerce – Uni CPO (Premium)

Description

The Product Options and Price Calculation Formulas for WooCommerce – Uni CPO (Premium) plugin for WordPress is vulnerable to arbitrary file uploads due to misconfigured file type validation in the 'uni_cpo_upload_file' function in all versions up to, and including, 4.9.54. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

AILast updated: 09/23/2025, 09:34:48 UTC

Technical Analysis

CVE-2025-10412 is a critical security vulnerability affecting the 'Product Options and Price Calculation Formulas for WooCommerce – Uni CPO (Premium)' plugin developed by MooMoo for WordPress. This plugin is widely used to extend WooCommerce functionality by allowing advanced product options and dynamic price calculations. The vulnerability arises from improper validation of uploaded files in the 'uni_cpo_upload_file' function across all plugin versions up to and including 4.9.54. Specifically, the plugin fails to restrict the types of files that can be uploaded, allowing unauthenticated attackers to upload arbitrary files, including potentially malicious scripts. This unrestricted file upload vulnerability (CWE-434) can lead to remote code execution (RCE) on the affected web server if the attacker uploads executable code such as PHP scripts. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, indicating that it can be exploited remotely without any authentication or user interaction, and can compromise confidentiality, integrity, and availability of the system. Although no public exploits have been reported yet, the ease of exploitation and the critical impact make this vulnerability a high priority for patching or mitigation. Given the widespread use of WooCommerce and the popularity of this plugin among e-commerce sites, the vulnerability poses a significant risk to online retailers using WordPress in general and the Uni CPO plugin in particular.

Potential Impact

For European organizations, this vulnerability presents a severe risk, especially for e-commerce businesses relying on WooCommerce and the Uni CPO plugin to manage product options and pricing. Successful exploitation could allow attackers to upload malicious code, leading to full server compromise, data theft (including customer personal and payment information), defacement of websites, disruption of business operations, and potential ransomware deployment. Given the GDPR regulations in Europe, a breach involving customer data could result in substantial regulatory fines and reputational damage. The vulnerability’s unauthenticated nature means attackers do not need valid credentials, increasing the attack surface. Moreover, many European small and medium enterprises (SMEs) use WordPress-based e-commerce solutions, often with limited cybersecurity resources, making them particularly vulnerable. The impact extends beyond individual businesses to supply chains and customers, potentially affecting trust in digital commerce platforms across Europe.

Mitigation Recommendations

Immediate mitigation steps include disabling the vulnerable file upload functionality if feasible until a patch is available. Organizations should monitor for updates from the plugin vendor and apply patches promptly once released. In the interim, implementing web application firewall (WAF) rules to block suspicious file uploads or requests targeting the vulnerable endpoint ('uni_cpo_upload_file') can reduce risk. Restricting file upload permissions on the server and ensuring uploaded files are stored outside the webroot or with strict execution restrictions can limit exploitation impact. Regularly auditing server logs for unusual upload activity and scanning for web shells or unauthorized files is recommended. Additionally, enforcing least privilege on the web server and isolating WordPress instances can help contain potential breaches. Organizations should also review their backup and incident response plans to prepare for possible compromise scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-13T23:01:44.618Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d269a359387df52bc4222b

Added to database: 9/23/2025, 9:34:27 AM

Last enriched: 9/23/2025, 9:34:48 AM

Last updated: 9/24/2025, 8:45:04 AM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats