Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12040: CWE-639 Authorization Bypass Through User-Controlled Key in themehunk Wishlist for WooCommerce

0
Medium
VulnerabilityCVE-2025-12040cvecve-2025-12040cwe-639
Published: Tue Nov 25 2025 (11/25/2025, 07:28:21 UTC)
Source: CVE Database V5
Vendor/Project: themehunk
Product: Wishlist for WooCommerce

Description

The Wishlist for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.0.9 via several functions in class-th-wishlist-frontend.php due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to modify other user's wishlists

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 19:55:51 UTC

Technical Analysis

CVE-2025-12040 is a security vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the Wishlist for WooCommerce plugin developed by themehunk for WordPress. The vulnerability exists in all versions up to and including 1.0.9. The root cause is an insecure direct object reference (IDOR) due to insufficient validation of a user-controlled key parameter in several functions within the class-th-wishlist-frontend.php file. This lack of proper authorization checks allows unauthenticated attackers to manipulate the wishlist data of other users by crafting requests with arbitrary keys. The vulnerability impacts the confidentiality and integrity of user wishlists, potentially exposing sensitive user preferences or enabling malicious modification of wishlist contents. The CVSS v3.1 base score is 6.5, reflecting a medium severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability affects the plugin’s core functionality that integrates with WooCommerce, a widely used e-commerce platform on WordPress, making it relevant to many online retail websites.

Potential Impact

The primary impact of this vulnerability is unauthorized access and modification of user wishlists on affected WooCommerce sites. This can lead to privacy violations as attackers can view other users’ saved products, potentially revealing purchasing intentions or personal preferences. Integrity is also compromised since attackers can alter wishlist contents, which may disrupt user experience or be leveraged in social engineering or fraud schemes. While the vulnerability does not directly affect availability, the trustworthiness of the e-commerce platform is undermined. For organizations, this can result in reputational damage, loss of customer trust, and potential regulatory scrutiny if personal data exposure is deemed significant. Since WooCommerce powers a large number of online stores globally, the scope of affected systems is broad. Exploitation requires no authentication or user interaction, increasing the risk of automated attacks or mass exploitation attempts once public details become widespread.

Mitigation Recommendations

Organizations should immediately verify if they use the Wishlist for WooCommerce plugin by themehunk and identify the plugin version. Since no official patch is currently linked, temporary mitigations include disabling the wishlist functionality or restricting access to wishlist-related endpoints via web application firewalls (WAF) or custom access controls. Implementing strict input validation and authorization checks on the user-controlled key parameter in the plugin’s code is critical; developers should ensure that wishlist modifications are only permitted for authenticated users and only on their own data. Monitoring web server logs for suspicious requests targeting wishlist endpoints can help detect exploitation attempts. Site administrators should keep all WordPress plugins updated and subscribe to vendor security advisories for timely patch releases. Additionally, consider isolating or sandboxing e-commerce components to limit the blast radius of such vulnerabilities. Employing security plugins that enforce role-based access control and rate limiting can further reduce risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-21T18:35:46.401Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69255e27292ce6fc00be05c9

Added to database: 11/25/2025, 7:43:35 AM

Last enriched: 2/27/2026, 7:55:51 PM

Last updated: 3/25/2026, 5:58:56 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses