CVE-2025-12777: CWE-285 Improper Authorization in yithemes YITH WooCommerce Wishlist
The YITH WooCommerce Wishlist plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 4.10.0. This is due to the plugin not properly verifying that a user is authorized to perform actions on the REST API /wp-json/yith/wishlist/v1/lists endpoint (which uses permission_callback => '__return_true') and the AJAX delete_item handler (which only checks nonce validity without verifying object-level authorization). This makes it possible for unauthenticated attackers to disclose wishlist tokens for any user and subsequently delete wishlist items by chaining the REST API authorization bypass with the exposed delete_item nonce on shared wishlist pages and the AJAX handler's missing object-level authorization check.
AI Analysis
Technical Summary
CVE-2025-12777 is an authorization bypass vulnerability classified under CWE-285 affecting the YITH WooCommerce Wishlist plugin for WordPress, specifically all versions up to and including 4.10.0. The root cause is improper authorization checks on two key components: the REST API endpoint /wp-json/yith/wishlist/v1/lists and the AJAX delete_item handler. The REST API endpoint uses a permission_callback set to '__return_true', effectively allowing any unauthenticated user to access wishlist data without restriction. Meanwhile, the AJAX delete_item handler validates only the nonce for request authenticity but lacks object-level authorization verification, meaning it does not confirm whether the requesting user has permission to delete the targeted wishlist item. An attacker can exploit this by first retrieving wishlist tokens from any user via the REST API bypass and then using these tokens combined with the nonce from shared wishlist pages to delete wishlist items via the AJAX handler. This chained attack compromises the integrity of user wishlists by allowing unauthorized deletion of items. The vulnerability does not expose confidential data directly but leaks wishlist tokens, which can be leveraged for further unauthorized actions. The CVSS 3.1 base score is 5.3 (medium), reflecting network attack vector, no privileges required, no user interaction, and impact limited to integrity loss without affecting confidentiality or availability. No patches or exploits are currently known, but the vulnerability is publicly disclosed and should be addressed promptly to prevent exploitation.
Potential Impact
The primary impact of CVE-2025-12777 is unauthorized modification of user wishlist data, specifically the deletion of wishlist items by unauthenticated attackers. This compromises data integrity and can disrupt user experience and trust in e-commerce platforms using the affected plugin. While confidentiality and availability are not directly impacted, the ability to manipulate user data without authorization can lead to reputational damage, customer dissatisfaction, and potential financial loss for online retailers. Attackers might also leverage this vulnerability as part of broader attacks targeting user accounts or to cause disruption in e-commerce operations. Organizations relying on YITH WooCommerce Wishlist for customer engagement risk undermining their platform's reliability and security posture if this vulnerability is exploited. The lack of authentication requirements and ease of exploitation increase the threat level, especially for high-traffic e-commerce sites.
Mitigation Recommendations
To mitigate CVE-2025-12777, organizations should immediately update the YITH WooCommerce Wishlist plugin to a version where this vulnerability is fixed once available. In the absence of an official patch, implement custom access controls on the REST API endpoint by replacing the permission_callback '__return_true' with a function that properly verifies user authorization. Additionally, enhance the AJAX delete_item handler to include strict object-level authorization checks ensuring that only authorized users can delete wishlist items. Restrict access to shared wishlist pages and monitor logs for unusual API or AJAX requests indicative of exploitation attempts. Employ Web Application Firewalls (WAFs) with rules targeting suspicious REST API and AJAX calls related to wishlist operations. Regularly audit and review plugin permissions and nonce implementations to ensure they follow best security practices. Finally, educate site administrators about the risks and encourage timely plugin updates and security monitoring.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, Netherlands, Italy, Spain, Brazil, India
CVE-2025-12777: CWE-285 Improper Authorization in yithemes YITH WooCommerce Wishlist
Description
The YITH WooCommerce Wishlist plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 4.10.0. This is due to the plugin not properly verifying that a user is authorized to perform actions on the REST API /wp-json/yith/wishlist/v1/lists endpoint (which uses permission_callback => '__return_true') and the AJAX delete_item handler (which only checks nonce validity without verifying object-level authorization). This makes it possible for unauthenticated attackers to disclose wishlist tokens for any user and subsequently delete wishlist items by chaining the REST API authorization bypass with the exposed delete_item nonce on shared wishlist pages and the AJAX handler's missing object-level authorization check.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-12777 is an authorization bypass vulnerability classified under CWE-285 affecting the YITH WooCommerce Wishlist plugin for WordPress, specifically all versions up to and including 4.10.0. The root cause is improper authorization checks on two key components: the REST API endpoint /wp-json/yith/wishlist/v1/lists and the AJAX delete_item handler. The REST API endpoint uses a permission_callback set to '__return_true', effectively allowing any unauthenticated user to access wishlist data without restriction. Meanwhile, the AJAX delete_item handler validates only the nonce for request authenticity but lacks object-level authorization verification, meaning it does not confirm whether the requesting user has permission to delete the targeted wishlist item. An attacker can exploit this by first retrieving wishlist tokens from any user via the REST API bypass and then using these tokens combined with the nonce from shared wishlist pages to delete wishlist items via the AJAX handler. This chained attack compromises the integrity of user wishlists by allowing unauthorized deletion of items. The vulnerability does not expose confidential data directly but leaks wishlist tokens, which can be leveraged for further unauthorized actions. The CVSS 3.1 base score is 5.3 (medium), reflecting network attack vector, no privileges required, no user interaction, and impact limited to integrity loss without affecting confidentiality or availability. No patches or exploits are currently known, but the vulnerability is publicly disclosed and should be addressed promptly to prevent exploitation.
Potential Impact
The primary impact of CVE-2025-12777 is unauthorized modification of user wishlist data, specifically the deletion of wishlist items by unauthenticated attackers. This compromises data integrity and can disrupt user experience and trust in e-commerce platforms using the affected plugin. While confidentiality and availability are not directly impacted, the ability to manipulate user data without authorization can lead to reputational damage, customer dissatisfaction, and potential financial loss for online retailers. Attackers might also leverage this vulnerability as part of broader attacks targeting user accounts or to cause disruption in e-commerce operations. Organizations relying on YITH WooCommerce Wishlist for customer engagement risk undermining their platform's reliability and security posture if this vulnerability is exploited. The lack of authentication requirements and ease of exploitation increase the threat level, especially for high-traffic e-commerce sites.
Mitigation Recommendations
To mitigate CVE-2025-12777, organizations should immediately update the YITH WooCommerce Wishlist plugin to a version where this vulnerability is fixed once available. In the absence of an official patch, implement custom access controls on the REST API endpoint by replacing the permission_callback '__return_true' with a function that properly verifies user authorization. Additionally, enhance the AJAX delete_item handler to include strict object-level authorization checks ensuring that only authorized users can delete wishlist items. Restrict access to shared wishlist pages and monitor logs for unusual API or AJAX requests indicative of exploitation attempts. Employ Web Application Firewalls (WAFs) with rules targeting suspicious REST API and AJAX calls related to wishlist operations. Regularly audit and review plugin permissions and nonce implementations to ensure they follow best security practices. Finally, educate site administrators about the risks and encourage timely plugin updates and security monitoring.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-05T20:43:52.611Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691d3cbbc00dea8b9c9becc1
Added to database: 11/19/2025, 3:42:51 AM
Last enriched: 2/27/2026, 9:07:35 PM
Last updated: 3/22/2026, 9:16:05 AM
Views: 112
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.