CVE-2025-11518: CWE-639 Authorization Bypass Through User-Controlled Key in wpclever WPC Smart Wishlist for WooCommerce
The WPC Smart Wishlist for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.0.3 via several wishlist AJAX functions due to missing validation on a user controlled key that is exposed when wishlists are shared. This makes it possible for unauthenticated attackers to empty and add to other user's wishlists, if they have access to the key.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-11518 affects the WPC Smart Wishlist for WooCommerce plugin for WordPress, specifically all versions up to and including 5.0.3. The issue is an Insecure Direct Object Reference (IDOR), classified under CWE-639, stemming from insufficient validation of a user-controlled key parameter used in AJAX wishlist functions. This key is exposed when users share their wishlists, allowing an attacker who obtains the key to bypass authorization controls. Consequently, unauthenticated attackers can add or remove items from other users' wishlists without permission. The vulnerability does not require any authentication or user interaction and can be exploited remotely over the network. While the flaw does not disclose sensitive information or disrupt service availability, it compromises the integrity of user data by allowing unauthorized modifications. The CVSS v3.1 base score is 5.3, reflecting medium severity, with the vector indicating network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, limited integrity impact, and no availability impact. No patches or known exploits are currently available or reported, but the exposure of wishlist keys in shared URLs or interfaces increases the risk of exploitation. This vulnerability highlights the importance of proper access control and validation mechanisms in web applications handling user-generated content and shared resources.
Potential Impact
The primary impact of CVE-2025-11518 is on the integrity of user data within the affected WooCommerce plugin. Attackers can manipulate wishlists of other users by adding or removing items without authorization. Although this does not directly compromise sensitive personal or financial information, it can degrade user experience and trust in the e-commerce platform. For businesses, unauthorized wishlist modifications could lead to confusion, customer dissatisfaction, and potential reputational damage. In some cases, attackers might exploit this to manipulate product popularity metrics or influence purchasing decisions indirectly. Since the vulnerability does not affect confidentiality or availability, the risk of data breaches or service outages is low. However, the ease of exploitation—requiring no authentication or user interaction—and the wide use of WooCommerce and WordPress globally mean that many online stores could be affected if they use this plugin version. The lack of patches increases the window of exposure, making timely mitigation critical to prevent abuse.
Mitigation Recommendations
Organizations using the WPC Smart Wishlist for WooCommerce plugin should take immediate steps to mitigate this vulnerability. First, monitor the plugin vendor's official channels for any forthcoming patches or updates addressing CVE-2025-11518 and apply them promptly once available. Until a patch is released, consider disabling the wishlist sharing feature or restricting access to wishlist keys to authenticated and authorized users only. Implement web application firewall (WAF) rules to detect and block suspicious AJAX requests attempting to manipulate wishlists without proper authorization. Review server and application logs for unusual activity related to wishlist modifications. Additionally, educate users about the risks of sharing wishlist URLs publicly and encourage them to avoid exposing keys in untrusted environments. For longer-term security, developers should enhance input validation and enforce strict access controls on user-controlled parameters, ensuring that keys cannot be used to access or modify other users' data. Regular security assessments and code reviews focusing on authorization logic are recommended to prevent similar issues.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, India, Brazil, Netherlands, Japan, Italy, Spain
CVE-2025-11518: CWE-639 Authorization Bypass Through User-Controlled Key in wpclever WPC Smart Wishlist for WooCommerce
Description
The WPC Smart Wishlist for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.0.3 via several wishlist AJAX functions due to missing validation on a user controlled key that is exposed when wishlists are shared. This makes it possible for unauthenticated attackers to empty and add to other user's wishlists, if they have access to the key.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2025-11518 affects the WPC Smart Wishlist for WooCommerce plugin for WordPress, specifically all versions up to and including 5.0.3. The issue is an Insecure Direct Object Reference (IDOR), classified under CWE-639, stemming from insufficient validation of a user-controlled key parameter used in AJAX wishlist functions. This key is exposed when users share their wishlists, allowing an attacker who obtains the key to bypass authorization controls. Consequently, unauthenticated attackers can add or remove items from other users' wishlists without permission. The vulnerability does not require any authentication or user interaction and can be exploited remotely over the network. While the flaw does not disclose sensitive information or disrupt service availability, it compromises the integrity of user data by allowing unauthorized modifications. The CVSS v3.1 base score is 5.3, reflecting medium severity, with the vector indicating network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, limited integrity impact, and no availability impact. No patches or known exploits are currently available or reported, but the exposure of wishlist keys in shared URLs or interfaces increases the risk of exploitation. This vulnerability highlights the importance of proper access control and validation mechanisms in web applications handling user-generated content and shared resources.
Potential Impact
The primary impact of CVE-2025-11518 is on the integrity of user data within the affected WooCommerce plugin. Attackers can manipulate wishlists of other users by adding or removing items without authorization. Although this does not directly compromise sensitive personal or financial information, it can degrade user experience and trust in the e-commerce platform. For businesses, unauthorized wishlist modifications could lead to confusion, customer dissatisfaction, and potential reputational damage. In some cases, attackers might exploit this to manipulate product popularity metrics or influence purchasing decisions indirectly. Since the vulnerability does not affect confidentiality or availability, the risk of data breaches or service outages is low. However, the ease of exploitation—requiring no authentication or user interaction—and the wide use of WooCommerce and WordPress globally mean that many online stores could be affected if they use this plugin version. The lack of patches increases the window of exposure, making timely mitigation critical to prevent abuse.
Mitigation Recommendations
Organizations using the WPC Smart Wishlist for WooCommerce plugin should take immediate steps to mitigate this vulnerability. First, monitor the plugin vendor's official channels for any forthcoming patches or updates addressing CVE-2025-11518 and apply them promptly once available. Until a patch is released, consider disabling the wishlist sharing feature or restricting access to wishlist keys to authenticated and authorized users only. Implement web application firewall (WAF) rules to detect and block suspicious AJAX requests attempting to manipulate wishlists without proper authorization. Review server and application logs for unusual activity related to wishlist modifications. Additionally, educate users about the risks of sharing wishlist URLs publicly and encourage them to avoid exposing keys in untrusted environments. For longer-term security, developers should enhance input validation and enforce strict access controls on user-controlled parameters, ensuring that keys cannot be used to access or modify other users' data. Regular security assessments and code reviews focusing on authorization logic are recommended to prevent similar issues.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-08T15:58:42.951Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ea182c5baaa01f1c9bed32
Added to database: 10/11/2025, 8:41:16 AM
Last enriched: 2/27/2026, 7:06:05 PM
Last updated: 3/26/2026, 12:55:56 AM
Views: 126
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.