Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11742: CWE-862 Missing Authorization in wpclever WPC Smart Wishlist for WooCommerce

0
Medium
VulnerabilityCVE-2025-11742cvecve-2025-11742cwe-862
Published: Sat Oct 18 2025 (10/18/2025, 05:41:56 UTC)
Source: CVE Database V5
Vendor/Project: wpclever
Product: WPC Smart Wishlist for WooCommerce

Description

The WPC Smart Wishlist for WooCommerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'wishlist_quickview' AJAX action in all versions up to, and including, 5.0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view other user's wishlist data and information.

AI-Powered Analysis

AILast updated: 10/25/2025, 09:55:01 UTC

Technical Analysis

CVE-2025-11742 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WPC Smart Wishlist for WooCommerce plugin for WordPress. This plugin is widely used to enhance WooCommerce stores by allowing customers to save products to wishlists. The vulnerability stems from the absence of a capability check on the 'wishlist_quickview' AJAX action, which is responsible for retrieving wishlist data. Because of this missing authorization, any authenticated user with at least Subscriber-level access can invoke this AJAX endpoint to access wishlist data belonging to other users. This exposure is limited to data confidentiality, as the attacker cannot modify or delete wishlist data, nor does the vulnerability impact system availability. The CVSS 3.1 base score is 4.3, reflecting low complexity of attack (low attack complexity), network attack vector, and no user interaction required, but limited impact on confidentiality only. The vulnerability affects all versions up to and including 5.0.4 of the plugin. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The issue is particularly relevant for e-commerce sites relying on WooCommerce and this plugin, as wishlist data may contain sensitive customer preferences and behavioral insights. Attackers with subscriber accounts could leverage this vulnerability to harvest personal data, potentially aiding in profiling or targeted phishing attacks. The vulnerability was publicly disclosed on October 18, 2025, with Wordfence as the assigner. Given the plugin’s popularity, the attack surface is significant, especially for European e-commerce businesses.

Potential Impact

For European organizations, the primary impact of CVE-2025-11742 is the unauthorized disclosure of customer wishlist data, which can include personal preferences and potentially sensitive information related to shopping habits. This breach of confidentiality can undermine customer trust and may lead to regulatory scrutiny under GDPR, especially if the data can be linked to identifiable individuals. Although the vulnerability does not allow data modification or service disruption, the exposure of personal data can facilitate social engineering, targeted phishing, or profiling attacks. E-commerce businesses relying on WooCommerce and this plugin risk reputational damage and potential legal consequences if customer data is mishandled. The ease of exploitation—requiring only subscriber-level authentication—means that attackers can create accounts or compromise low-privilege accounts to exploit the flaw. This increases the likelihood of exploitation in environments where user registration is open or poorly monitored. The vulnerability’s impact is thus primarily on confidentiality and privacy, with indirect effects on business operations and compliance posture.

Mitigation Recommendations

1. Monitor for and apply any official patches or updates released by wpclever for the WPC Smart Wishlist plugin as soon as they become available. 2. In the absence of a patch, implement temporary access controls by restricting subscriber-level permissions to prevent unauthorized AJAX calls, possibly by disabling wishlist features for low-privilege users. 3. Employ Web Application Firewall (WAF) rules to detect and block suspicious AJAX requests targeting the 'wishlist_quickview' action from unauthorized users. 4. Audit user roles and registrations to limit the creation of unnecessary subscriber accounts and monitor for anomalous account activity. 5. Review and harden WordPress and WooCommerce security configurations, including limiting access to REST and AJAX endpoints. 6. Educate site administrators and developers about the vulnerability to ensure rapid response and awareness. 7. Consider implementing custom code to add authorization checks on the vulnerable AJAX endpoint if immediate patching is not possible. 8. Regularly review logs for unauthorized access attempts to wishlist data to detect exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-10-14T14:04:03.801Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f32a83bd206a5487a89662

Added to database: 10/18/2025, 5:49:55 AM

Last enriched: 10/25/2025, 9:55:01 AM

Last updated: 12/4/2025, 8:27:29 PM

Views: 138

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats