CVE-2025-11518: CWE-639 Authorization Bypass Through User-Controlled Key in wpclever WPC Smart Wishlist for WooCommerce
The WPC Smart Wishlist for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.0.3 via several wishlist AJAX functions due to missing validation on a user controlled key that is exposed when wishlists are shared. This makes it possible for unauthenticated attackers to empty and add to other user's wishlists, if they have access to the key.
AI Analysis
Technical Summary
CVE-2025-11518 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the WPC Smart Wishlist for WooCommerce plugin for WordPress. The vulnerability exists in all versions up to and including 5.0.3. The root cause is an Insecure Direct Object Reference (IDOR) in several AJAX functions that handle wishlist operations. Specifically, the plugin exposes a user-controlled key when wishlists are shared, but fails to validate this key properly on the server side before allowing modifications. As a result, an unauthenticated attacker who obtains or guesses this key can add or remove items from other users’ wishlists without authorization. The flaw affects the integrity of wishlist data but does not compromise confidentiality or availability. The CVSS v3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based, requires no privileges or user interaction, and impacts integrity only. No patches or exploits are currently documented, indicating this is a newly disclosed vulnerability. The plugin is widely used in WooCommerce-based e-commerce sites, which are prevalent in Europe. Attackers could leverage this vulnerability to manipulate user shopping preferences, potentially causing customer dissatisfaction or fraud. The vulnerability highlights the importance of validating user-controlled keys and enforcing strict authorization checks on shared resource operations in web applications.
Potential Impact
For European organizations operating WooCommerce-based e-commerce platforms using the WPC Smart Wishlist plugin, this vulnerability poses a risk to the integrity of customer data. Attackers can alter wishlist contents, potentially misleading customers, disrupting marketing campaigns, or causing reputational damage. While the vulnerability does not expose sensitive personal information or disrupt service availability, the manipulation of wishlists can undermine user trust and affect sales. Retailers relying on wishlist data for personalized recommendations or promotions may see degraded effectiveness. The risk is heightened in countries with high WooCommerce market penetration such as the United Kingdom, Germany, France, and the Netherlands. Additionally, organizations subject to strict data integrity and consumer protection regulations (e.g., GDPR) must consider the compliance implications of unauthorized data manipulation. Although no active exploitation is reported, the ease of exploitation without authentication means attackers could opportunistically target vulnerable sites, especially those with publicly accessible wishlist keys.
Mitigation Recommendations
Until an official patch is released, European organizations should implement several specific mitigations: 1) Restrict access to wishlist keys by ensuring they are not exposed in URLs or client-side code accessible to unauthorized users. 2) Implement server-side authorization checks that verify the requesting user’s permission to modify the wishlist associated with the provided key. 3) Monitor wishlist modification endpoints for anomalous activity, such as rapid or repeated changes from the same IP or unusual patterns inconsistent with normal user behavior. 4) Consider disabling the wishlist sharing feature temporarily if it cannot be secured. 5) Educate developers and administrators on secure handling of user-controlled keys and the risks of IDOR vulnerabilities. 6) Review and harden other AJAX endpoints in the WooCommerce environment for similar authorization weaknesses. 7) Engage with the plugin vendor or community to obtain or expedite a security patch. 8) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious wishlist modification requests referencing unauthorized keys.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-11518: CWE-639 Authorization Bypass Through User-Controlled Key in wpclever WPC Smart Wishlist for WooCommerce
Description
The WPC Smart Wishlist for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.0.3 via several wishlist AJAX functions due to missing validation on a user controlled key that is exposed when wishlists are shared. This makes it possible for unauthenticated attackers to empty and add to other user's wishlists, if they have access to the key.
AI-Powered Analysis
Technical Analysis
CVE-2025-11518 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the WPC Smart Wishlist for WooCommerce plugin for WordPress. The vulnerability exists in all versions up to and including 5.0.3. The root cause is an Insecure Direct Object Reference (IDOR) in several AJAX functions that handle wishlist operations. Specifically, the plugin exposes a user-controlled key when wishlists are shared, but fails to validate this key properly on the server side before allowing modifications. As a result, an unauthenticated attacker who obtains or guesses this key can add or remove items from other users’ wishlists without authorization. The flaw affects the integrity of wishlist data but does not compromise confidentiality or availability. The CVSS v3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based, requires no privileges or user interaction, and impacts integrity only. No patches or exploits are currently documented, indicating this is a newly disclosed vulnerability. The plugin is widely used in WooCommerce-based e-commerce sites, which are prevalent in Europe. Attackers could leverage this vulnerability to manipulate user shopping preferences, potentially causing customer dissatisfaction or fraud. The vulnerability highlights the importance of validating user-controlled keys and enforcing strict authorization checks on shared resource operations in web applications.
Potential Impact
For European organizations operating WooCommerce-based e-commerce platforms using the WPC Smart Wishlist plugin, this vulnerability poses a risk to the integrity of customer data. Attackers can alter wishlist contents, potentially misleading customers, disrupting marketing campaigns, or causing reputational damage. While the vulnerability does not expose sensitive personal information or disrupt service availability, the manipulation of wishlists can undermine user trust and affect sales. Retailers relying on wishlist data for personalized recommendations or promotions may see degraded effectiveness. The risk is heightened in countries with high WooCommerce market penetration such as the United Kingdom, Germany, France, and the Netherlands. Additionally, organizations subject to strict data integrity and consumer protection regulations (e.g., GDPR) must consider the compliance implications of unauthorized data manipulation. Although no active exploitation is reported, the ease of exploitation without authentication means attackers could opportunistically target vulnerable sites, especially those with publicly accessible wishlist keys.
Mitigation Recommendations
Until an official patch is released, European organizations should implement several specific mitigations: 1) Restrict access to wishlist keys by ensuring they are not exposed in URLs or client-side code accessible to unauthorized users. 2) Implement server-side authorization checks that verify the requesting user’s permission to modify the wishlist associated with the provided key. 3) Monitor wishlist modification endpoints for anomalous activity, such as rapid or repeated changes from the same IP or unusual patterns inconsistent with normal user behavior. 4) Consider disabling the wishlist sharing feature temporarily if it cannot be secured. 5) Educate developers and administrators on secure handling of user-controlled keys and the risks of IDOR vulnerabilities. 6) Review and harden other AJAX endpoints in the WooCommerce environment for similar authorization weaknesses. 7) Engage with the plugin vendor or community to obtain or expedite a security patch. 8) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious wishlist modification requests referencing unauthorized keys.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-08T15:58:42.951Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ea182c5baaa01f1c9bed32
Added to database: 10/11/2025, 8:41:16 AM
Last enriched: 10/19/2025, 1:01:21 AM
Last updated: 12/1/2025, 9:09:46 PM
Views: 82
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65840: n/a
UnknownCVE-2025-66295: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in getgrav grav
HighCVE-2025-55749: CWE-284: Improper Access Control in xwiki xwiki-platform
HighCVE-2024-51999: CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes in expressjs express
LowCVE-2025-65838: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.