CVE-2024-13718: CWE-352 Cross-Site Request Forgery (CSRF) in wpdesk Flexible Wishlist for WooCommerce – Ecommerce Wishlist & Save for later
CVE-2024-13718 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the Flexible Wishlist for WooCommerce – Ecommerce Wishlist & Save for later WordPress plugin up to version 1. 2. 26. The flaw arises from missing or incorrect nonce validation on multiple functions, allowing unauthenticated attackers to trick site administrators into performing unintended actions via crafted requests. Exploitation can lead to unauthorized modification, creation, or updating of other users' wishlists without their consent. The vulnerability requires user interaction (an admin clicking a malicious link) but no authentication by the attacker, and it does not impact confidentiality or availability, only integrity of wishlist data. The CVSS 3. 1 base score is 4. 3, indicating medium severity. No known exploits are currently reported in the wild.
AI Analysis
Technical Summary
CVE-2024-13718 is a medium-severity CSRF vulnerability identified in the Flexible Wishlist for WooCommerce – Ecommerce Wishlist & Save for later plugin for WordPress, affecting all versions up to and including 1.2.26. The root cause is the absence or improper implementation of nonce validation on several plugin functions, which are intended to protect against unauthorized state-changing requests. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and not from malicious third parties. Due to this flaw, an attacker can craft a malicious web request that, if an authenticated site administrator or user with sufficient privileges clicks on it, will execute actions such as modifying, updating, or creating wishlist entries on behalf of other users without their knowledge or consent. This attack vector exploits the trust between the user's browser and the web application, leveraging the victim's authenticated session. The vulnerability does not require the attacker to be authenticated and only requires user interaction, specifically the victim clicking a crafted link or visiting a malicious webpage. The impact is limited to the integrity of wishlist data; confidentiality and availability are not affected. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N) reflects network attack vector, low attack complexity, no privileges required, user interaction required, unchanged scope, no confidentiality or availability impact, and limited integrity impact. No patches or exploit code are currently publicly available, but the vulnerability is published and should be addressed promptly by site administrators. Given the popularity of WooCommerce and WordPress, this vulnerability could be leveraged in targeted attacks against ecommerce platforms to manipulate user wishlists, potentially affecting customer experience and trust.
Potential Impact
The primary impact of CVE-2024-13718 is unauthorized modification of user wishlist data on affected ecommerce sites using the vulnerable plugin. While this does not compromise sensitive personal or payment information, it undermines data integrity and could disrupt user experience by altering or corrupting wishlist contents. Attackers could exploit this to manipulate product interest data, potentially skewing business analytics or customer engagement metrics. In some scenarios, attackers might use this as part of a broader attack chain, such as social engineering or phishing campaigns targeting site administrators. Although the vulnerability does not affect system availability or confidentiality, the integrity compromise could erode customer trust and damage brand reputation. For organizations relying heavily on WooCommerce wishlists for marketing or sales strategies, this could have indirect financial consequences. The requirement for user interaction and the need to trick an admin into clicking a malicious link somewhat limits the exploitability, but the risk remains significant for high-value ecommerce sites with active administrative users.
Mitigation Recommendations
To mitigate CVE-2024-13718, organizations should first verify if they are using the Flexible Wishlist for WooCommerce – Ecommerce Wishlist & Save for later plugin and identify the version in use. Since no official patch links are currently available, administrators should monitor the vendor’s updates and apply patches immediately once released. In the interim, consider disabling or removing the plugin if wishlist functionality is non-critical. Implementing Web Application Firewall (WAF) rules to detect and block suspicious CSRF attempts targeting wishlist-related endpoints can reduce risk. Educate site administrators about the dangers of clicking untrusted links, especially when logged into the WordPress admin panel. Enforce the principle of least privilege by limiting administrative access to trusted personnel only. Additionally, review and harden nonce validation mechanisms in custom or third-party plugins to ensure proper CSRF protections are in place. Regularly audit WordPress plugins for security compliance and keep all components updated to minimize exposure to known vulnerabilities.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, Netherlands, India, Brazil, Japan, Italy, Spain
CVE-2024-13718: CWE-352 Cross-Site Request Forgery (CSRF) in wpdesk Flexible Wishlist for WooCommerce – Ecommerce Wishlist & Save for later
Description
CVE-2024-13718 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the Flexible Wishlist for WooCommerce – Ecommerce Wishlist & Save for later WordPress plugin up to version 1. 2. 26. The flaw arises from missing or incorrect nonce validation on multiple functions, allowing unauthenticated attackers to trick site administrators into performing unintended actions via crafted requests. Exploitation can lead to unauthorized modification, creation, or updating of other users' wishlists without their consent. The vulnerability requires user interaction (an admin clicking a malicious link) but no authentication by the attacker, and it does not impact confidentiality or availability, only integrity of wishlist data. The CVSS 3. 1 base score is 4. 3, indicating medium severity. No known exploits are currently reported in the wild.
AI-Powered Analysis
Technical Analysis
CVE-2024-13718 is a medium-severity CSRF vulnerability identified in the Flexible Wishlist for WooCommerce – Ecommerce Wishlist & Save for later plugin for WordPress, affecting all versions up to and including 1.2.26. The root cause is the absence or improper implementation of nonce validation on several plugin functions, which are intended to protect against unauthorized state-changing requests. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and not from malicious third parties. Due to this flaw, an attacker can craft a malicious web request that, if an authenticated site administrator or user with sufficient privileges clicks on it, will execute actions such as modifying, updating, or creating wishlist entries on behalf of other users without their knowledge or consent. This attack vector exploits the trust between the user's browser and the web application, leveraging the victim's authenticated session. The vulnerability does not require the attacker to be authenticated and only requires user interaction, specifically the victim clicking a crafted link or visiting a malicious webpage. The impact is limited to the integrity of wishlist data; confidentiality and availability are not affected. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N) reflects network attack vector, low attack complexity, no privileges required, user interaction required, unchanged scope, no confidentiality or availability impact, and limited integrity impact. No patches or exploit code are currently publicly available, but the vulnerability is published and should be addressed promptly by site administrators. Given the popularity of WooCommerce and WordPress, this vulnerability could be leveraged in targeted attacks against ecommerce platforms to manipulate user wishlists, potentially affecting customer experience and trust.
Potential Impact
The primary impact of CVE-2024-13718 is unauthorized modification of user wishlist data on affected ecommerce sites using the vulnerable plugin. While this does not compromise sensitive personal or payment information, it undermines data integrity and could disrupt user experience by altering or corrupting wishlist contents. Attackers could exploit this to manipulate product interest data, potentially skewing business analytics or customer engagement metrics. In some scenarios, attackers might use this as part of a broader attack chain, such as social engineering or phishing campaigns targeting site administrators. Although the vulnerability does not affect system availability or confidentiality, the integrity compromise could erode customer trust and damage brand reputation. For organizations relying heavily on WooCommerce wishlists for marketing or sales strategies, this could have indirect financial consequences. The requirement for user interaction and the need to trick an admin into clicking a malicious link somewhat limits the exploitability, but the risk remains significant for high-value ecommerce sites with active administrative users.
Mitigation Recommendations
To mitigate CVE-2024-13718, organizations should first verify if they are using the Flexible Wishlist for WooCommerce – Ecommerce Wishlist & Save for later plugin and identify the version in use. Since no official patch links are currently available, administrators should monitor the vendor’s updates and apply patches immediately once released. In the interim, consider disabling or removing the plugin if wishlist functionality is non-critical. Implementing Web Application Firewall (WAF) rules to detect and block suspicious CSRF attempts targeting wishlist-related endpoints can reduce risk. Educate site administrators about the dangers of clicking untrusted links, especially when logged into the WordPress admin panel. Enforce the principle of least privilege by limiting administrative access to trusted personnel only. Additionally, review and harden nonce validation mechanisms in custom or third-party plugins to ensure proper CSRF protections are in place. Regularly audit WordPress plugins for security compliance and keep all components updated to minimize exposure to known vulnerabilities.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-24T15:35:10.684Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e6ab7ef31ef0b5a0440
Added to database: 2/25/2026, 9:49:30 PM
Last enriched: 2/25/2026, 10:30:03 PM
Last updated: 2/26/2026, 7:02:25 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.