Goal Reached Thanks to every supporter โ€” we hit 100%!

Goal: 1000 CNY ยท Raised: 1000 CNY

100.0%

CVE-2025-10412 โ€” AI Deep Analysis Summary

CVSS 9.8 ยท Critical

Q1What is this vulnerability? (Essence + Consequences)

๐Ÿšจ **Essence**: Critical code flaw in **Uni CPO (Premium)** plugin. <br>๐Ÿ’ฅ **Consequences**: Full system compromise. CVSS is **HIGHEST** (9.8/10). Attackers gain total control over the WordPress site.

Q2Root Cause? (CWE/Flaw)

๐Ÿ›ก๏ธ **Root Cause**: **CWE-434** (Unrestricted Upload of File with Dangerous Type). <br>โš ๏ธ **Flaw**: The plugin allows uploading or handling files without proper validation, leading to remote code execution.

Q3Who is affected? (Versions/Components)

๐Ÿ“ฆ **Affected**: **MooMoo**'s **Product Options and Price Calculation Formulas for WooCommerce โ€“ Uni CPO (Premium)**. <br>๐Ÿ“‰ **Version**: **4.9.54 and earlier**. If you are on this version or older, you are at risk!

Q4What can hackers do? (Privileges/Data)

๐Ÿ”“ **Hackers Can**: Execute arbitrary code. <br>๐Ÿ‘๏ธ **Data Access**: Read sensitive data. <br>๐Ÿ”ง **Modification**: Alter site content. <br>๐Ÿ“‰ **Availability**: Crash the server. <br>*(CVSS: C:H, I:H, A:H)*

Q5Is exploitation threshold high? (Auth/Config)

๐Ÿ”‘ **Threshold**: **LOW**. <br>๐Ÿšซ **Auth**: No authentication required (**PR:N**). <br>๐ŸŒ **Network**: Remote (**AV:N**). <br>๐Ÿ‘€ **UI**: No user interaction needed (**UI:N**). Easy to exploit!

Q6Is there a public Exp? (PoC/Wild Exploitation)

๐Ÿ’ป **Public Exploit**: **No** specific PoC provided in data (**pocs**: []). <br>๐Ÿ”ฅ **Wild Exploit**: Likely exists due to high severity and low barrier. Assume it is being exploited in the wild.

Q7How to self-check? (Features/Scanning)

๐Ÿ” **Self-Check**: Scan for **Uni CPO (Premium)** plugin. <br>๐Ÿ“Š **Version Check**: Verify if version is **โ‰ค 4.9.54**. <br>๐Ÿ› ๏ธ **Tool**: Use WordPress plugin scanners or check `wp-content/plugins` directory.

Q8Is it fixed officially? (Patch/Mitigation)

๐Ÿฉน **Fix**: Update plugin to **version > 4.9.54**. <br>๐Ÿ“ข **Vendor**: **MooMoo** (Builderius).โ€ฆ

Q9What if no patch? (Workaround)

๐Ÿšง **No Patch?**: **Disable** the plugin immediately. <br>๐Ÿงฑ **WAF**: Block file upload endpoints related to CPO. <br>๐Ÿ‘ฎ **Monitor**: Watch for suspicious PHP execution in uploads folder.

Q10Is it urgent? (Priority Suggestion)

๐Ÿšจ **Urgency**: **CRITICAL**. <br>โฐ **Priority**: **IMMEDIATE ACTION**. <br>๐Ÿ“… **Published**: 2025-09-23. <br>๐Ÿ’ก **Advice**: Patch NOW. This is a high-severity, remote, unauthenticated vulnerability.