CVE-2025-13391: CWE-862 Missing Authorization in MooMoo Product Options and Price Calculation Formulas for WooCommerce – Uni CPO (Premium)
The Product Options and Price Calculation Formulas for WooCommerce – Uni CPO (Premium) plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'uni_cpo_remove_file' function in all versions up to, and including, 4.9.60. This makes it possible for unauthenticated attackers to delete arbitrary attachments or files stored in Dropbox if the file path is known. The vulnerability was partially patched in version 4.9.60.
AI Analysis
Technical Summary
CVE-2025-13391 is a vulnerability identified in the Product Options and Price Calculation Formulas for WooCommerce – Uni CPO (Premium) WordPress plugin, which is widely used to customize product options and pricing formulas in WooCommerce stores. The root cause is a missing authorization (CWE-862) in the 'uni_cpo_remove_file' function, which fails to verify user capabilities before allowing file deletion requests. This flaw enables unauthenticated attackers to delete arbitrary attachments or files stored externally in Dropbox, provided they know the exact file path. The vulnerability affects all plugin versions up to and including 4.9.60, with a partial patch applied in version 4.9.60. The attack vector is network-based with no authentication or user interaction required, making exploitation straightforward for remote attackers. The vulnerability impacts data integrity by permitting unauthorized deletion of files, potentially disrupting business operations or causing data loss. Although no known exploits are currently reported in the wild, the ease of exploitation and the widespread use of WooCommerce and Dropbox integrations elevate the risk. The CVSS v3.1 base score is 5.8, indicating a medium severity level, with the vector string AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N highlighting no confidentiality or availability impact but a significant integrity impact and scope change due to cross-component effects. The vulnerability was assigned and published by Wordfence and is tracked under CWE-862 (Missing Authorization).
Potential Impact
The primary impact of CVE-2025-13391 is unauthorized modification of data integrity, specifically the deletion of arbitrary files stored in Dropbox linked to WooCommerce stores using the Uni CPO plugin. This can lead to loss of critical business documents, product attachments, or pricing formula files, potentially disrupting e-commerce operations and causing financial and reputational damage. Since the vulnerability requires no authentication and can be exploited remotely, attackers can perform targeted deletions without detection if file paths are known or can be guessed. The lack of confidentiality and availability impact reduces the risk of data leakage or denial of service, but the integrity loss alone can have serious consequences for businesses relying on accurate product data and pricing. Organizations with automated workflows or backups dependent on these files may experience cascading failures or incorrect pricing calculations. The partial patch in version 4.9.60 mitigates some risk, but unpatched installations remain vulnerable. The absence of known exploits in the wild suggests limited current exploitation but does not preclude future attacks, especially as attackers often target popular e-commerce platforms. Overall, the threat poses a moderate risk to organizations globally, particularly those heavily invested in WooCommerce and Dropbox integrations.
Mitigation Recommendations
1. Immediately update the Uni CPO (Premium) plugin to the latest version beyond 4.9.60 that fully addresses the missing authorization vulnerability. 2. Implement strict access controls and permissions on Dropbox storage to limit file deletion capabilities to trusted accounts and services only. 3. Monitor file deletion logs and Dropbox activity for unusual or unauthorized deletion attempts, using automated alerting where possible. 4. Restrict exposure of file paths and URLs that could be leveraged by attackers to guess or enumerate files for deletion. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the 'uni_cpo_remove_file' function or related endpoints. 6. Conduct regular security audits and code reviews of custom WooCommerce plugins and integrations to ensure proper authorization checks are in place. 7. Educate development and operations teams about the risks of missing authorization and the importance of capability checks in plugin functions. 8. Maintain regular backups of critical files stored in Dropbox and WooCommerce to enable recovery in case of unauthorized deletion. 9. Consider isolating Dropbox storage accounts used for WooCommerce attachments to minimize blast radius in case of compromise. 10. Stay informed about updates and advisories from the plugin vendor and security communities regarding this vulnerability and related threats.
Affected Countries
United States, United Kingdom, Germany, Australia, Canada, Japan, France, Netherlands, Brazil, India
CVE-2025-13391: CWE-862 Missing Authorization in MooMoo Product Options and Price Calculation Formulas for WooCommerce – Uni CPO (Premium)
Description
The Product Options and Price Calculation Formulas for WooCommerce – Uni CPO (Premium) plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'uni_cpo_remove_file' function in all versions up to, and including, 4.9.60. This makes it possible for unauthenticated attackers to delete arbitrary attachments or files stored in Dropbox if the file path is known. The vulnerability was partially patched in version 4.9.60.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-13391 is a vulnerability identified in the Product Options and Price Calculation Formulas for WooCommerce – Uni CPO (Premium) WordPress plugin, which is widely used to customize product options and pricing formulas in WooCommerce stores. The root cause is a missing authorization (CWE-862) in the 'uni_cpo_remove_file' function, which fails to verify user capabilities before allowing file deletion requests. This flaw enables unauthenticated attackers to delete arbitrary attachments or files stored externally in Dropbox, provided they know the exact file path. The vulnerability affects all plugin versions up to and including 4.9.60, with a partial patch applied in version 4.9.60. The attack vector is network-based with no authentication or user interaction required, making exploitation straightforward for remote attackers. The vulnerability impacts data integrity by permitting unauthorized deletion of files, potentially disrupting business operations or causing data loss. Although no known exploits are currently reported in the wild, the ease of exploitation and the widespread use of WooCommerce and Dropbox integrations elevate the risk. The CVSS v3.1 base score is 5.8, indicating a medium severity level, with the vector string AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N highlighting no confidentiality or availability impact but a significant integrity impact and scope change due to cross-component effects. The vulnerability was assigned and published by Wordfence and is tracked under CWE-862 (Missing Authorization).
Potential Impact
The primary impact of CVE-2025-13391 is unauthorized modification of data integrity, specifically the deletion of arbitrary files stored in Dropbox linked to WooCommerce stores using the Uni CPO plugin. This can lead to loss of critical business documents, product attachments, or pricing formula files, potentially disrupting e-commerce operations and causing financial and reputational damage. Since the vulnerability requires no authentication and can be exploited remotely, attackers can perform targeted deletions without detection if file paths are known or can be guessed. The lack of confidentiality and availability impact reduces the risk of data leakage or denial of service, but the integrity loss alone can have serious consequences for businesses relying on accurate product data and pricing. Organizations with automated workflows or backups dependent on these files may experience cascading failures or incorrect pricing calculations. The partial patch in version 4.9.60 mitigates some risk, but unpatched installations remain vulnerable. The absence of known exploits in the wild suggests limited current exploitation but does not preclude future attacks, especially as attackers often target popular e-commerce platforms. Overall, the threat poses a moderate risk to organizations globally, particularly those heavily invested in WooCommerce and Dropbox integrations.
Mitigation Recommendations
1. Immediately update the Uni CPO (Premium) plugin to the latest version beyond 4.9.60 that fully addresses the missing authorization vulnerability. 2. Implement strict access controls and permissions on Dropbox storage to limit file deletion capabilities to trusted accounts and services only. 3. Monitor file deletion logs and Dropbox activity for unusual or unauthorized deletion attempts, using automated alerting where possible. 4. Restrict exposure of file paths and URLs that could be leveraged by attackers to guess or enumerate files for deletion. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the 'uni_cpo_remove_file' function or related endpoints. 6. Conduct regular security audits and code reviews of custom WooCommerce plugins and integrations to ensure proper authorization checks are in place. 7. Educate development and operations teams about the risks of missing authorization and the importance of capability checks in plugin functions. 8. Maintain regular backups of critical files stored in Dropbox and WooCommerce to enable recovery in case of unauthorized deletion. 9. Consider isolating Dropbox storage accounts used for WooCommerce attachments to minimize blast radius in case of compromise. 10. Stay informed about updates and advisories from the plugin vendor and security communities regarding this vulnerability and related threats.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-18T23:21:10.049Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698cb25d4b57a58fa1a74845
Added to database: 2/11/2026, 4:46:21 PM
Last enriched: 2/27/2026, 9:49:42 AM
Last updated: 3/28/2026, 10:06:22 PM
Views: 68
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.