CVE-2025-11532: CWE-639 Authorization Bypass Through User-Controlled Key in softivus Wisly
The Wisly plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.0.0 due to missing validation on the 'wishlist_id' user controlled key. This makes it possible for unauthenticated attackers to remove and add items to other user's wishlists.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-11532 affects the Wisly plugin for WordPress, a tool designed to manage user wishlists. The issue is an Insecure Direct Object Reference (IDOR) stemming from the lack of proper validation on the 'wishlist_id' parameter, which is user-controlled. This means that when a request is made to add or remove items from a wishlist, the plugin does not verify whether the requester is authorized to modify the specified wishlist. Consequently, an unauthenticated attacker can craft requests targeting arbitrary 'wishlist_id' values belonging to other users, thereby adding or removing items from their wishlists without permission. The vulnerability impacts all versions up to and including 1.0.0 of Wisly. The CVSS 3.1 score of 5.3 reflects that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and affects only integrity (I:L) without impacting confidentiality or availability. The scope remains unchanged (S:U). No patches or known exploits are currently reported, but the vulnerability is publicly disclosed and assigned a CVE. This flaw could be exploited to manipulate user data, potentially leading to user dissatisfaction or reputational damage for site operators. The root cause is insufficient authorization checks on user-supplied input, a common security oversight in web applications.
Potential Impact
The primary impact of CVE-2025-11532 is unauthorized modification of user wishlists on WordPress sites using the Wisly plugin. While this does not expose sensitive personal information or disrupt service availability, it compromises data integrity by allowing attackers to alter wishlist contents arbitrarily. This can lead to user confusion, loss of trust, and potential business impact for e-commerce sites relying on wishlists for customer engagement and sales. Attackers could remove desired items or add unwanted items, potentially skewing analytics or promotional campaigns. Since exploitation requires no authentication or user interaction, the attack surface is broad, increasing risk. However, the impact is limited to wishlist data and does not extend to broader system compromise or data leakage. Organizations with high volumes of e-commerce traffic or user engagement through wishlists are more likely to experience reputational harm and customer dissatisfaction if exploited.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict server-side authorization checks validating that the authenticated user owns the wishlist identified by 'wishlist_id' before permitting any modifications. Even if the plugin currently lacks authentication requirements, adding authentication and session management is critical. Input validation should reject any requests with invalid or unauthorized 'wishlist_id' values. Site administrators should update the Wisly plugin to a patched version once available or apply custom patches to enforce these checks. Employing Web Application Firewalls (WAFs) with rules to detect and block anomalous requests targeting wishlist endpoints can provide temporary protection. Regular security audits and code reviews focusing on access control mechanisms in plugins are recommended to prevent similar issues. Monitoring logs for unusual wishlist modification patterns may help detect exploitation attempts early. Finally, educating developers and administrators about the risks of IDOR vulnerabilities and secure coding practices is essential for long-term prevention.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, India, Brazil, France, Netherlands, Japan, Italy
CVE-2025-11532: CWE-639 Authorization Bypass Through User-Controlled Key in softivus Wisly
Description
The Wisly plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.0.0 due to missing validation on the 'wishlist_id' user controlled key. This makes it possible for unauthenticated attackers to remove and add items to other user's wishlists.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2025-11532 affects the Wisly plugin for WordPress, a tool designed to manage user wishlists. The issue is an Insecure Direct Object Reference (IDOR) stemming from the lack of proper validation on the 'wishlist_id' parameter, which is user-controlled. This means that when a request is made to add or remove items from a wishlist, the plugin does not verify whether the requester is authorized to modify the specified wishlist. Consequently, an unauthenticated attacker can craft requests targeting arbitrary 'wishlist_id' values belonging to other users, thereby adding or removing items from their wishlists without permission. The vulnerability impacts all versions up to and including 1.0.0 of Wisly. The CVSS 3.1 score of 5.3 reflects that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and affects only integrity (I:L) without impacting confidentiality or availability. The scope remains unchanged (S:U). No patches or known exploits are currently reported, but the vulnerability is publicly disclosed and assigned a CVE. This flaw could be exploited to manipulate user data, potentially leading to user dissatisfaction or reputational damage for site operators. The root cause is insufficient authorization checks on user-supplied input, a common security oversight in web applications.
Potential Impact
The primary impact of CVE-2025-11532 is unauthorized modification of user wishlists on WordPress sites using the Wisly plugin. While this does not expose sensitive personal information or disrupt service availability, it compromises data integrity by allowing attackers to alter wishlist contents arbitrarily. This can lead to user confusion, loss of trust, and potential business impact for e-commerce sites relying on wishlists for customer engagement and sales. Attackers could remove desired items or add unwanted items, potentially skewing analytics or promotional campaigns. Since exploitation requires no authentication or user interaction, the attack surface is broad, increasing risk. However, the impact is limited to wishlist data and does not extend to broader system compromise or data leakage. Organizations with high volumes of e-commerce traffic or user engagement through wishlists are more likely to experience reputational harm and customer dissatisfaction if exploited.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict server-side authorization checks validating that the authenticated user owns the wishlist identified by 'wishlist_id' before permitting any modifications. Even if the plugin currently lacks authentication requirements, adding authentication and session management is critical. Input validation should reject any requests with invalid or unauthorized 'wishlist_id' values. Site administrators should update the Wisly plugin to a patched version once available or apply custom patches to enforce these checks. Employing Web Application Firewalls (WAFs) with rules to detect and block anomalous requests targeting wishlist endpoints can provide temporary protection. Regular security audits and code reviews focusing on access control mechanisms in plugins are recommended to prevent similar issues. Monitoring logs for unusual wishlist modification patterns may help detect exploitation attempts early. Finally, educating developers and administrators about the risks of IDOR vulnerabilities and secure coding practices is essential for long-term prevention.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-08T19:14:04.214Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6912b12e14bc3e00ba783cab
Added to database: 11/11/2025, 3:44:46 AM
Last enriched: 2/27/2026, 7:07:07 PM
Last updated: 3/22/2026, 11:11:28 PM
Views: 48
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.