CVE-2025-55741
📋 TL;DR
This vulnerability allows users without proper delete privileges to bypass access controls and delete products via the mass-delete endpoint in UnoPim. It affects all organizations using UnoPim versions 0.3.0 and earlier, potentially leading to unauthorized data deletion and business disruption.
💻 Affected Systems
- UnoPim
📦 What is this software?
Unopim by Webkul
⚠️ Risk & Real-World Impact
Worst Case
Malicious or compromised users could delete all products in the system, causing complete data loss, operational disruption, and significant business impact.
Likely Case
Users with limited privileges could delete products they shouldn't have access to, leading to data integrity issues and potential business process disruption.
If Mitigated
With proper access controls and monitoring, impact would be limited to isolated incidents that can be quickly detected and remediated.
🎯 Exploit Status
Exploitation requires authenticated access but minimal technical skill. Public advisory includes demonstration video.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 0.3.1
Vendor Advisory: https://github.com/unopim/unopim/security/advisories/GHSA-8p2f-fx4q-75cx
Restart Required: Yes
Instructions:
1. Backup your UnoPim database and application files. 2. Update UnoPim to version 0.3.1 via composer: 'composer require unopim/unopim:0.3.1'. 3. Run database migrations if required. 4. Restart your web server and queue workers.
🧯 If You Can't Patch
- Implement network-level access controls to restrict access to mass-delete endpoints
- Enable detailed logging and monitoring for all delete operations and implement alerting
🔍 How to Verify
Check if Vulnerable:
Check your UnoPim version via 'composer show unopim/unopim' or check the application's version file. If version is 0.3.0 or earlier, you are vulnerable.
Check Version:
composer show unopim/unopim | grep versions
Verify Fix Applied:
After updating, verify the version is 0.3.1 and test that users without delete privileges cannot access mass-delete functionality.
📡 Detection & Monitoring
Log Indicators:
- Multiple DELETE requests to mass-delete endpoints from users without delete privileges
- Unusual patterns of product deletions
Network Indicators:
- HTTP POST/DELETE requests to /api/products/mass-delete or similar endpoints
SIEM Query:
source="web_logs" AND (uri_path="*mass-delete*" OR uri_path="*bulk-delete*") AND http_method IN ("POST", "DELETE") AND user_role!="admin"
🔗 References
- https://github.com/unopim/unopim/commit/c14eebe653aafd8dc713ca729165177e63315989
- https://github.com/unopim/unopim/security/advisories/GHSA-8p2f-fx4q-75cx
- https://www.youtube.com/watch?v=J_WV8fCXlJM
- https://github.com/unopim/unopim/security/advisories/GHSA-8p2f-fx4q-75cx
- https://www.youtube.com/watch?v=J_WV8fCXlJM