Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12087: CWE-639 Authorization Bypass Through User-Controlled Key in acowebs Wishlist and Save for later for Woocommerce

0
Medium
VulnerabilityCVE-2025-12087cvecve-2025-12087cwe-639
Published: Wed Nov 12 2025 (11/12/2025, 04:29:08 UTC)
Source: CVE Database V5
Vendor/Project: acowebs
Product: Wishlist and Save for later for Woocommerce

Description

The Wishlist and Save for later for Woocommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.1.22 via the 'awwlm_remove_added_wishlist_page' AJAX action due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete wishlist items from other user's wishlists.

AI-Powered Analysis

AILast updated: 11/12/2025, 04:49:13 UTC

Technical Analysis

CVE-2025-12087 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the Wishlist and Save for later for Woocommerce plugin for WordPress. The flaw exists in all versions up to and including 1.1.22. The vulnerability arises from insufficient validation of a user-controlled key parameter in the AJAX action 'awwlm_remove_added_wishlist_page'. This AJAX endpoint is intended to allow users to remove items from their own wishlists. However, due to missing validation, an authenticated attacker with at least Subscriber-level privileges can manipulate the key parameter to target and delete wishlist items belonging to other users. This constitutes an Insecure Direct Object Reference (IDOR) vulnerability, enabling unauthorized modification of other users' wishlist data. The attack vector is network-based and does not require user interaction beyond authentication. The CVSS v3.1 base score is 4.3 (medium severity), reflecting low complexity and no impact on confidentiality or availability, but a partial impact on integrity. No patches or fixes have been released at the time of publication, and no known exploits have been observed in the wild. The vulnerability could be leveraged to disrupt user experience, cause confusion, or damage trust in e-commerce platforms relying on this plugin.

Potential Impact

For European organizations operating e-commerce websites using WordPress with the affected Wishlist and Save for later for Woocommerce plugin, this vulnerability poses a risk to data integrity and user trust. Attackers with low-level authenticated access (Subscriber or above) can delete wishlist items of other users, potentially leading to customer dissatisfaction and reputational damage. While the vulnerability does not expose sensitive data or disrupt service availability, unauthorized modification of user data can undermine confidence in the platform's security. In sectors with strict data protection regulations such as GDPR, failure to secure user data integrity could lead to compliance scrutiny if exploited. Additionally, attackers might use this flaw as part of broader attacks to escalate privileges or conduct targeted harassment. The impact is more pronounced for organizations with large user bases or those relying heavily on wishlist features for marketing and sales strategies.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the affected Wishlist and Save for later for Woocommerce plugin versions up to 1.1.22. Until an official patch is released, administrators should consider disabling the wishlist functionality or restricting access to the AJAX endpoint via web application firewall (WAF) rules that validate user permissions and parameters. Implementing strict server-side validation to ensure that users can only modify their own wishlist items is critical. Monitoring logs for suspicious AJAX requests targeting 'awwlm_remove_added_wishlist_page' can help detect exploitation attempts. Organizations should also enforce the principle of least privilege by limiting Subscriber-level accounts and reviewing user roles regularly. Promptly applying any future patches from the vendor is essential. Additionally, informing users about potential risks and encouraging them to report anomalies can aid in early detection.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-22T18:11:13.326Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691410463f7e91646d5ffa29

Added to database: 11/12/2025, 4:42:46 AM

Last enriched: 11/12/2025, 4:49:13 AM

Last updated: 11/12/2025, 7:27:33 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats