CVE-2025-12087: CWE-639 Authorization Bypass Through User-Controlled Key in acowebs Wishlist and Save for later for Woocommerce
The Wishlist and Save for later for Woocommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.1.22 via the 'awwlm_remove_added_wishlist_page' AJAX action due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete wishlist items from other user's wishlists.
AI Analysis
Technical Summary
CVE-2025-12087 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the Wishlist and Save for later for Woocommerce plugin for WordPress. The flaw exists in all versions up to and including 1.1.22. The vulnerability arises from insufficient validation of a user-controlled key parameter in the AJAX action 'awwlm_remove_added_wishlist_page'. This AJAX endpoint is intended to allow users to remove items from their own wishlists. However, due to missing validation, an authenticated attacker with at least Subscriber-level privileges can manipulate the key parameter to target and delete wishlist items belonging to other users. This constitutes an Insecure Direct Object Reference (IDOR) vulnerability, enabling unauthorized modification of other users' wishlist data. The attack vector is network-based and does not require user interaction beyond authentication. The CVSS v3.1 base score is 4.3 (medium severity), reflecting low complexity and no impact on confidentiality or availability, but a partial impact on integrity. No patches or fixes have been released at the time of publication, and no known exploits have been observed in the wild. The vulnerability could be leveraged to disrupt user experience, cause confusion, or damage trust in e-commerce platforms relying on this plugin.
Potential Impact
For European organizations operating e-commerce websites using WordPress with the affected Wishlist and Save for later for Woocommerce plugin, this vulnerability poses a risk to data integrity and user trust. Attackers with low-level authenticated access (Subscriber or above) can delete wishlist items of other users, potentially leading to customer dissatisfaction and reputational damage. While the vulnerability does not expose sensitive data or disrupt service availability, unauthorized modification of user data can undermine confidence in the platform's security. In sectors with strict data protection regulations such as GDPR, failure to secure user data integrity could lead to compliance scrutiny if exploited. Additionally, attackers might use this flaw as part of broader attacks to escalate privileges or conduct targeted harassment. The impact is more pronounced for organizations with large user bases or those relying heavily on wishlist features for marketing and sales strategies.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the affected Wishlist and Save for later for Woocommerce plugin versions up to 1.1.22. Until an official patch is released, administrators should consider disabling the wishlist functionality or restricting access to the AJAX endpoint via web application firewall (WAF) rules that validate user permissions and parameters. Implementing strict server-side validation to ensure that users can only modify their own wishlist items is critical. Monitoring logs for suspicious AJAX requests targeting 'awwlm_remove_added_wishlist_page' can help detect exploitation attempts. Organizations should also enforce the principle of least privilege by limiting Subscriber-level accounts and reviewing user roles regularly. Promptly applying any future patches from the vendor is essential. Additionally, informing users about potential risks and encouraging them to report anomalies can aid in early detection.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-12087: CWE-639 Authorization Bypass Through User-Controlled Key in acowebs Wishlist and Save for later for Woocommerce
Description
The Wishlist and Save for later for Woocommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.1.22 via the 'awwlm_remove_added_wishlist_page' AJAX action due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete wishlist items from other user's wishlists.
AI-Powered Analysis
Technical Analysis
CVE-2025-12087 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the Wishlist and Save for later for Woocommerce plugin for WordPress. The flaw exists in all versions up to and including 1.1.22. The vulnerability arises from insufficient validation of a user-controlled key parameter in the AJAX action 'awwlm_remove_added_wishlist_page'. This AJAX endpoint is intended to allow users to remove items from their own wishlists. However, due to missing validation, an authenticated attacker with at least Subscriber-level privileges can manipulate the key parameter to target and delete wishlist items belonging to other users. This constitutes an Insecure Direct Object Reference (IDOR) vulnerability, enabling unauthorized modification of other users' wishlist data. The attack vector is network-based and does not require user interaction beyond authentication. The CVSS v3.1 base score is 4.3 (medium severity), reflecting low complexity and no impact on confidentiality or availability, but a partial impact on integrity. No patches or fixes have been released at the time of publication, and no known exploits have been observed in the wild. The vulnerability could be leveraged to disrupt user experience, cause confusion, or damage trust in e-commerce platforms relying on this plugin.
Potential Impact
For European organizations operating e-commerce websites using WordPress with the affected Wishlist and Save for later for Woocommerce plugin, this vulnerability poses a risk to data integrity and user trust. Attackers with low-level authenticated access (Subscriber or above) can delete wishlist items of other users, potentially leading to customer dissatisfaction and reputational damage. While the vulnerability does not expose sensitive data or disrupt service availability, unauthorized modification of user data can undermine confidence in the platform's security. In sectors with strict data protection regulations such as GDPR, failure to secure user data integrity could lead to compliance scrutiny if exploited. Additionally, attackers might use this flaw as part of broader attacks to escalate privileges or conduct targeted harassment. The impact is more pronounced for organizations with large user bases or those relying heavily on wishlist features for marketing and sales strategies.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the affected Wishlist and Save for later for Woocommerce plugin versions up to 1.1.22. Until an official patch is released, administrators should consider disabling the wishlist functionality or restricting access to the AJAX endpoint via web application firewall (WAF) rules that validate user permissions and parameters. Implementing strict server-side validation to ensure that users can only modify their own wishlist items is critical. Monitoring logs for suspicious AJAX requests targeting 'awwlm_remove_added_wishlist_page' can help detect exploitation attempts. Organizations should also enforce the principle of least privilege by limiting Subscriber-level accounts and reviewing user roles regularly. Promptly applying any future patches from the vendor is essential. Additionally, informing users about potential risks and encouraging them to report anomalies can aid in early detection.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-22T18:11:13.326Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691410463f7e91646d5ffa29
Added to database: 11/12/2025, 4:42:46 AM
Last enriched: 11/12/2025, 4:49:13 AM
Last updated: 11/12/2025, 7:27:33 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11560: CWE-79 Cross-Site Scripting (XSS) in Team Members Showcase
UnknownCVE-2025-12901: CWE-352 Cross-Site Request Forgery (CSRF) in asgaros Asgaros Forum
MediumCVE-2025-12833: CWE-639 Authorization Bypass Through User-Controlled Key in paoltaia GeoDirectory – WP Business Directory Plugin and Classified Listings Directory
MediumCVE-2025-54983: CWE-772 Missing Release of Resource after Effective Lifetime in Zscaler Zscaler Client Connector
MediumResearchers Detect Malicious npm Package Targeting GitHub-Owned Repositories
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.