CVE-2025-12427: CWE-639 Authorization Bypass Through User-Controlled Key in yithemes YITH WooCommerce Wishlist
CVE-2025-12427 is a medium-severity vulnerability in the YITH WooCommerce Wishlist WordPress plugin affecting all versions up to 4. 10. 0. It involves an authorization bypass via an insecure direct object reference (CWE-639) due to missing validation on user-controlled keys in REST API and AJAX endpoints. Unauthenticated attackers can discover any user's wishlist token ID and rename their wishlist without permission, impacting data integrity. This flaw enables mass tampering, defacement, social engineering, and profiling attacks on multi-user WooCommerce stores. No authentication or user interaction is required, and the vulnerability has a CVSS score of 5. 3. Although no known exploits are reported in the wild yet, the vulnerability poses a risk to e-commerce sites using this plugin. European organizations running WooCommerce stores with this plugin should prioritize patching or mitigating this issue to prevent potential abuse.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-12427 affects the YITH WooCommerce Wishlist plugin for WordPress, a widely used extension that allows users to create and manage wishlists on WooCommerce-based e-commerce sites. The flaw is an Insecure Direct Object Reference (IDOR), classified under CWE-639, arising from insufficient validation of user-controlled keys in the plugin's REST API endpoint and AJAX handler. Specifically, the plugin fails to verify that the requester is authorized to access or modify the wishlist identified by a token ID, allowing unauthenticated attackers to enumerate wishlist token IDs of any user. Once an attacker obtains a victim's wishlist token ID, they can rename the wishlist arbitrarily, thereby compromising the integrity of the victim's data. This vulnerability does not impact confidentiality or availability directly but allows unauthorized modification of wishlist names, which can be leveraged for defacement, social engineering (e.g., misleading wishlist names to trick users), mass tampering of user data, and profiling of users at scale. The attack vector is remote network access without any privileges or user interaction, making exploitation relatively straightforward. The vulnerability affects all versions up to and including 4.10.0 of the plugin. No official patches or fixes are linked yet, and no known exploits have been observed in the wild as of the publication date. The CVSS v3.1 base score is 5.3, reflecting medium severity due to the integrity impact and ease of exploitation without authentication.
Potential Impact
For European organizations operating WooCommerce stores with the YITH WooCommerce Wishlist plugin, this vulnerability can lead to unauthorized modification of user wishlists, undermining customer trust and potentially damaging brand reputation. Attackers could rename wishlists to misleading or offensive terms, causing defacement visible to users and visitors. This can facilitate social engineering attacks by manipulating wishlist content to trick users into phishing or fraud. Additionally, mass tampering could disrupt user experience and lead to increased support costs. Profiling users by enumerating wishlist token IDs may expose behavioral patterns or preferences, raising privacy concerns under GDPR regulations. While the vulnerability does not directly expose sensitive data or cause service outages, the integrity compromise and potential for social engineering pose significant risks to e-commerce operations and customer relations in Europe.
Mitigation Recommendations
European organizations should immediately audit their WooCommerce installations to identify if the YITH WooCommerce Wishlist plugin is installed and determine the version in use. Until an official patch is released, administrators should consider disabling the wishlist functionality or restricting access to the REST API and AJAX endpoints related to the wishlist plugin via web application firewalls or custom access controls. Implementing strict validation and authorization checks on wishlist token IDs at the application or proxy level can mitigate unauthorized access. Monitoring logs for unusual API requests or mass renaming activities can help detect exploitation attempts. Organizations should also communicate with the plugin vendor to obtain timely patches and apply updates as soon as they become available. Additionally, educating users about potential phishing or social engineering risks related to wishlist tampering can reduce the impact of attacks leveraging this vulnerability.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-12427: CWE-639 Authorization Bypass Through User-Controlled Key in yithemes YITH WooCommerce Wishlist
Description
CVE-2025-12427 is a medium-severity vulnerability in the YITH WooCommerce Wishlist WordPress plugin affecting all versions up to 4. 10. 0. It involves an authorization bypass via an insecure direct object reference (CWE-639) due to missing validation on user-controlled keys in REST API and AJAX endpoints. Unauthenticated attackers can discover any user's wishlist token ID and rename their wishlist without permission, impacting data integrity. This flaw enables mass tampering, defacement, social engineering, and profiling attacks on multi-user WooCommerce stores. No authentication or user interaction is required, and the vulnerability has a CVSS score of 5. 3. Although no known exploits are reported in the wild yet, the vulnerability poses a risk to e-commerce sites using this plugin. European organizations running WooCommerce stores with this plugin should prioritize patching or mitigating this issue to prevent potential abuse.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-12427 affects the YITH WooCommerce Wishlist plugin for WordPress, a widely used extension that allows users to create and manage wishlists on WooCommerce-based e-commerce sites. The flaw is an Insecure Direct Object Reference (IDOR), classified under CWE-639, arising from insufficient validation of user-controlled keys in the plugin's REST API endpoint and AJAX handler. Specifically, the plugin fails to verify that the requester is authorized to access or modify the wishlist identified by a token ID, allowing unauthenticated attackers to enumerate wishlist token IDs of any user. Once an attacker obtains a victim's wishlist token ID, they can rename the wishlist arbitrarily, thereby compromising the integrity of the victim's data. This vulnerability does not impact confidentiality or availability directly but allows unauthorized modification of wishlist names, which can be leveraged for defacement, social engineering (e.g., misleading wishlist names to trick users), mass tampering of user data, and profiling of users at scale. The attack vector is remote network access without any privileges or user interaction, making exploitation relatively straightforward. The vulnerability affects all versions up to and including 4.10.0 of the plugin. No official patches or fixes are linked yet, and no known exploits have been observed in the wild as of the publication date. The CVSS v3.1 base score is 5.3, reflecting medium severity due to the integrity impact and ease of exploitation without authentication.
Potential Impact
For European organizations operating WooCommerce stores with the YITH WooCommerce Wishlist plugin, this vulnerability can lead to unauthorized modification of user wishlists, undermining customer trust and potentially damaging brand reputation. Attackers could rename wishlists to misleading or offensive terms, causing defacement visible to users and visitors. This can facilitate social engineering attacks by manipulating wishlist content to trick users into phishing or fraud. Additionally, mass tampering could disrupt user experience and lead to increased support costs. Profiling users by enumerating wishlist token IDs may expose behavioral patterns or preferences, raising privacy concerns under GDPR regulations. While the vulnerability does not directly expose sensitive data or cause service outages, the integrity compromise and potential for social engineering pose significant risks to e-commerce operations and customer relations in Europe.
Mitigation Recommendations
European organizations should immediately audit their WooCommerce installations to identify if the YITH WooCommerce Wishlist plugin is installed and determine the version in use. Until an official patch is released, administrators should consider disabling the wishlist functionality or restricting access to the REST API and AJAX endpoints related to the wishlist plugin via web application firewalls or custom access controls. Implementing strict validation and authorization checks on wishlist token IDs at the application or proxy level can mitigate unauthorized access. Monitoring logs for unusual API requests or mass renaming activities can help detect exploitation attempts. Organizations should also communicate with the plugin vendor to obtain timely patches and apply updates as soon as they become available. Additionally, educating users about potential phishing or social engineering risks related to wishlist tampering can reduce the impact of attacks leveraging this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-28T19:57:51.583Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691d3cbbc00dea8b9c9becb3
Added to database: 11/19/2025, 3:42:51 AM
Last enriched: 11/19/2025, 3:58:27 AM
Last updated: 11/19/2025, 4:03:11 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-6251: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wproyal Royal Addons for Elementor – Addons and Templates Kit for Elementor
MediumCVE-2025-12777: CWE-285 Improper Authorization in yithemes YITH WooCommerce Wishlist
MediumCVE-2025-12770: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in saadiqbal New User Approve
MediumCVE-2025-13051: CWE-427 Uncontrolled Search Path Element in ASUSTOR ABP and AES
CriticalCVE-2025-13225: Vulnerability in Tanium TanOS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.