Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12040: CWE-639 Authorization Bypass Through User-Controlled Key in themehunk Wishlist for WooCommerce

0
Medium
VulnerabilityCVE-2025-12040cvecve-2025-12040cwe-639
Published: Tue Nov 25 2025 (11/25/2025, 07:28:21 UTC)
Source: CVE Database V5
Vendor/Project: themehunk
Product: Wishlist for WooCommerce

Description

CVE-2025-12040 is a medium severity vulnerability in the Wishlist for WooCommerce WordPress plugin, affecting all versions up to 1. 0. 9. It is an authorization bypass issue caused by insecure direct object references (CWE-639) due to missing validation on a user-controlled key. This flaw allows unauthenticated attackers to modify other users' wishlists without needing authentication or user interaction. The vulnerability impacts confidentiality and integrity but not availability. No known exploits are currently reported in the wild. European organizations using WooCommerce with this plugin are at risk of unauthorized data manipulation, potentially affecting customer trust and data privacy. Mitigation involves updating the plugin once a patch is available or implementing strict server-side validation of user keys. Countries with high WooCommerce adoption and e-commerce activity, such as Germany, the UK, France, and the Netherlands, are most likely to be affected.

AI-Powered Analysis

AILast updated: 12/02/2025, 14:45:56 UTC

Technical Analysis

CVE-2025-12040 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the Wishlist for WooCommerce plugin for WordPress. The vulnerability exists in all versions up to and including 1.0.9, specifically within multiple functions in the class-th-wishlist-frontend.php file. The root cause is the lack of proper validation on a user-controlled key parameter, which leads to an Insecure Direct Object Reference (IDOR). This flaw allows an unauthenticated attacker to manipulate the wishlist data of other users by crafting requests that specify arbitrary keys, bypassing authorization checks. The CVSS v3.1 base score is 6.5, reflecting a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality and integrity but not availability. Although no known exploits have been reported in the wild, the vulnerability poses a risk to the confidentiality and integrity of user data stored in wishlists. The plugin is widely used in WooCommerce-powered e-commerce sites, which are common in European markets. The vulnerability could lead to unauthorized data manipulation, potentially undermining customer trust and violating data protection regulations if personal data is involved.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized modification of customer wishlist data, impacting data confidentiality and integrity. While it does not affect system availability, the ability for unauthenticated attackers to alter user-specific data can result in loss of customer trust and potential reputational damage. Additionally, if wishlists contain personal or sensitive information, this could raise compliance issues under GDPR. E-commerce businesses relying on WooCommerce and the affected plugin may face increased risk of targeted attacks aiming to disrupt customer experience or manipulate data for fraudulent purposes. The vulnerability could also be leveraged as part of a broader attack chain to gain further access or conduct social engineering attacks. The absence of required authentication lowers the barrier for exploitation, increasing the threat level for organizations with exposed WooCommerce installations.

Mitigation Recommendations

1. Immediately monitor for updates from the plugin vendor (themehunk) and apply patches as soon as they are released. 2. Until a patch is available, implement server-side validation to strictly verify that any user-controlled keys correspond to the authenticated user's data, rejecting unauthorized requests. 3. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting wishlist modification endpoints. 4. Conduct regular security audits and penetration testing focusing on authorization controls within WooCommerce plugins. 5. Educate development and operations teams on secure coding practices, particularly regarding authorization and input validation. 6. Limit exposure by restricting access to wishlist modification APIs to authenticated users only, if feasible. 7. Monitor logs for unusual activity related to wishlist modifications to detect potential exploitation attempts early. 8. Consider isolating or disabling the wishlist feature temporarily if it is not critical to business operations until the vulnerability is resolved.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-21T18:35:46.401Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69255e27292ce6fc00be05c9

Added to database: 11/25/2025, 7:43:35 AM

Last enriched: 12/2/2025, 2:45:56 PM

Last updated: 12/3/2025, 10:16:48 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats