CVE-2025-12427: CWE-639 Authorization Bypass Through User-Controlled Key in yithemes YITH WooCommerce Wishlist
The YITH WooCommerce Wishlist plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.10.0 via the REST API endpoint and AJAX handler due to missing validation on user-controlled keys. This makes it possible for unauthenticated attackers to discover any user's wishlist token ID, and subsequently rename the victim's wishlist without authorization (integrity impact). This can be exploited to target multi-user stores for defacement, social engineering attacks, mass tampering, and profiling at scale.
AI Analysis
Technical Summary
CVE-2025-12427 affects the YITH WooCommerce Wishlist plugin for WordPress, versions up to and including 4.10.0. The vulnerability is an authorization bypass caused by insecure direct object references (CWE-639) in the plugin's REST API endpoint and AJAX handler. Specifically, the plugin fails to properly validate user-controlled keys that identify wishlist token IDs, allowing unauthenticated attackers to enumerate any user's wishlist token. Once an attacker discovers a victim's wishlist token ID, they can rename the wishlist without any authorization checks, compromising the integrity of the victim's data. This flaw arises because the plugin does not enforce ownership verification or access control on these operations, exposing wishlist management functions to unauthorized users. The vulnerability is exploitable remotely over the network without requiring authentication or user interaction, making it relatively easy to exploit. The impact is limited to integrity, as attackers cannot read or delete wishlists but can alter wishlist names, which can be leveraged for defacement, social engineering, or profiling attacks in multi-user e-commerce stores. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The CVSS v3.1 base score is 5.3, reflecting network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality or availability impact, and low integrity impact.
Potential Impact
The primary impact of this vulnerability is on data integrity within e-commerce environments using the YITH WooCommerce Wishlist plugin. Attackers can rename any user's wishlist, potentially causing confusion, defacement, or misleading information that could be exploited for social engineering or phishing attacks. In multi-user stores, this can lead to reputational damage, loss of customer trust, and operational disruption if attackers manipulate wishlists en masse. Although confidentiality and availability are not directly affected, the ability to tamper with user data at scale can facilitate profiling and targeted attacks against customers. Organizations relying on this plugin risk undermining user experience and trust, which can have downstream financial and brand impacts. The ease of exploitation without authentication increases the threat level, especially for high-traffic WooCommerce stores with many users. However, the lack of known active exploits and the medium CVSS score suggest the threat is moderate but should not be ignored.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first check for and apply any official patches or updates from the YITH WooCommerce Wishlist plugin vendor once available. In the absence of patches, administrators can implement the following specific mitigations: 1) Restrict access to the REST API endpoints and AJAX handlers related to wishlist management by enforcing strict authentication and authorization checks at the web server or application firewall level. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests attempting to enumerate or modify wishlist token IDs. 3) Monitor logs for unusual activity patterns targeting wishlist endpoints, such as repeated requests with varying token IDs from unauthenticated sources. 4) Consider disabling the wishlist feature temporarily if it is not critical to business operations until a patch is available. 5) Educate users and staff about potential phishing or social engineering risks stemming from manipulated wishlist data. 6) Review and harden WordPress and WooCommerce security configurations to reduce overall attack surface. These targeted actions go beyond generic advice by focusing on access control, monitoring, and temporary feature disablement to reduce exposure.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, Netherlands, Italy, Spain, Brazil
CVE-2025-12427: CWE-639 Authorization Bypass Through User-Controlled Key in yithemes YITH WooCommerce Wishlist
Description
The YITH WooCommerce Wishlist plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.10.0 via the REST API endpoint and AJAX handler due to missing validation on user-controlled keys. This makes it possible for unauthenticated attackers to discover any user's wishlist token ID, and subsequently rename the victim's wishlist without authorization (integrity impact). This can be exploited to target multi-user stores for defacement, social engineering attacks, mass tampering, and profiling at scale.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-12427 affects the YITH WooCommerce Wishlist plugin for WordPress, versions up to and including 4.10.0. The vulnerability is an authorization bypass caused by insecure direct object references (CWE-639) in the plugin's REST API endpoint and AJAX handler. Specifically, the plugin fails to properly validate user-controlled keys that identify wishlist token IDs, allowing unauthenticated attackers to enumerate any user's wishlist token. Once an attacker discovers a victim's wishlist token ID, they can rename the wishlist without any authorization checks, compromising the integrity of the victim's data. This flaw arises because the plugin does not enforce ownership verification or access control on these operations, exposing wishlist management functions to unauthorized users. The vulnerability is exploitable remotely over the network without requiring authentication or user interaction, making it relatively easy to exploit. The impact is limited to integrity, as attackers cannot read or delete wishlists but can alter wishlist names, which can be leveraged for defacement, social engineering, or profiling attacks in multi-user e-commerce stores. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The CVSS v3.1 base score is 5.3, reflecting network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality or availability impact, and low integrity impact.
Potential Impact
The primary impact of this vulnerability is on data integrity within e-commerce environments using the YITH WooCommerce Wishlist plugin. Attackers can rename any user's wishlist, potentially causing confusion, defacement, or misleading information that could be exploited for social engineering or phishing attacks. In multi-user stores, this can lead to reputational damage, loss of customer trust, and operational disruption if attackers manipulate wishlists en masse. Although confidentiality and availability are not directly affected, the ability to tamper with user data at scale can facilitate profiling and targeted attacks against customers. Organizations relying on this plugin risk undermining user experience and trust, which can have downstream financial and brand impacts. The ease of exploitation without authentication increases the threat level, especially for high-traffic WooCommerce stores with many users. However, the lack of known active exploits and the medium CVSS score suggest the threat is moderate but should not be ignored.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first check for and apply any official patches or updates from the YITH WooCommerce Wishlist plugin vendor once available. In the absence of patches, administrators can implement the following specific mitigations: 1) Restrict access to the REST API endpoints and AJAX handlers related to wishlist management by enforcing strict authentication and authorization checks at the web server or application firewall level. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests attempting to enumerate or modify wishlist token IDs. 3) Monitor logs for unusual activity patterns targeting wishlist endpoints, such as repeated requests with varying token IDs from unauthenticated sources. 4) Consider disabling the wishlist feature temporarily if it is not critical to business operations until a patch is available. 5) Educate users and staff about potential phishing or social engineering risks stemming from manipulated wishlist data. 6) Review and harden WordPress and WooCommerce security configurations to reduce overall attack surface. These targeted actions go beyond generic advice by focusing on access control, monitoring, and temporary feature disablement to reduce exposure.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-28T19:57:51.583Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691d3cbbc00dea8b9c9becb3
Added to database: 11/19/2025, 3:42:51 AM
Last enriched: 2/27/2026, 8:34:20 PM
Last updated: 3/22/2026, 5:29:11 PM
Views: 97
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.