Product Options and Price Calculation Formulas for WooCommerce – Un…

Product Options and Price Calculation Formulas for WooCommerce – Un…

by | Feb 11, 2026 | Plugins

Attack Vectors

CVE-2025-13391 affects the WordPress plugin Product Options and Price Calculation Formulas for WooCommerce – Uni CPO (Premium) (slug: uni-woo-custom-product-options-premium) and is rated Medium severity (CVSS 5.8). In versions up to and including 4.9.60, an unauthenticated attacker may be able to trigger deletion of files if they can guess or obtain the file path.

From a business perspective, the most realistic scenarios involve opportunistic scanning of exposed WordPress sites, followed by targeted attempts to remove media assets (attachments) or connected files (such as Dropbox-hosted files) used in product pages, landing pages, and campaigns.

Security Weakness

The issue is described as a missing authorization check in the plugin function uni_cpo_remove_file. In plain terms, the plugin does not adequately verify that the person requesting a file removal is allowed to do so.

Wordfence reports that this can enable unauthenticated arbitrary attachment deletion and deletion of Dropbox-stored files if the path is known, and notes the issue was only partially patched in 4.9.60. The recommended remediation is to update to 4.9.61 or newer. Source: Wordfence vulnerability record. CVE record: CVE-2025-13391.

Technical or Business Impacts

Operational disruption: deleted product images, PDFs, design files, or configurable-option assets can break product pages and checkout experiences, directly impacting conversion rates and revenue.

Brand and campaign risk: missing media on high-visibility pages (homepages, paid landing pages, seasonal promotions) creates an immediate perception of unreliability and can waste paid media spend while teams scramble to restore assets.

Compliance and audit exposure: unexpected loss of records or customer-facing disclosures (policies, warranty documents, accessibility statements) can create governance issues, especially if your organization has change-control requirements or must demonstrate content integrity over time.

Recovery cost: even when backups exist, restoring media libraries and re-linking assets across pages, product templates, and marketing automation content can be time-consuming and costly, pulling teams away from growth initiatives.

Similar Attacks

Unauthorized actions in WordPress plugins (such as missing permission checks or unsafe file-handling) have repeatedly been used to disrupt sites, damage content, or enable deeper compromise. Examples include:

WP File Manager vulnerability and widespread exploitation (Wordfence)
RevSlider vulnerability leading to large-scale WordPress compromises (Sucuri)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers