Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12777: CWE-285 Improper Authorization in yithemes YITH WooCommerce Wishlist

0
Medium
VulnerabilityCVE-2025-12777cvecve-2025-12777cwe-285
Published: Wed Nov 19 2025 (11/19/2025, 03:29:38 UTC)
Source: CVE Database V5
Vendor/Project: yithemes
Product: YITH WooCommerce Wishlist

Description

The YITH WooCommerce Wishlist plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 4.10.0. This is due to the plugin not properly verifying that a user is authorized to perform actions on the REST API /wp-json/yith/wishlist/v1/lists endpoint (which uses permission_callback => '__return_true') and the AJAX delete_item handler (which only checks nonce validity without verifying object-level authorization). This makes it possible for unauthenticated attackers to disclose wishlist tokens for any user and subsequently delete wishlist items by chaining the REST API authorization bypass with the exposed delete_item nonce on shared wishlist pages and the AJAX handler's missing object-level authorization check.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 21:07:35 UTC

Technical Analysis

CVE-2025-12777 is an authorization bypass vulnerability classified under CWE-285 affecting the YITH WooCommerce Wishlist plugin for WordPress, specifically all versions up to and including 4.10.0. The root cause is improper authorization checks on two key components: the REST API endpoint /wp-json/yith/wishlist/v1/lists and the AJAX delete_item handler. The REST API endpoint uses a permission_callback set to '__return_true', effectively allowing any unauthenticated user to access wishlist data without restriction. Meanwhile, the AJAX delete_item handler validates only the nonce for request authenticity but lacks object-level authorization verification, meaning it does not confirm whether the requesting user has permission to delete the targeted wishlist item. An attacker can exploit this by first retrieving wishlist tokens from any user via the REST API bypass and then using these tokens combined with the nonce from shared wishlist pages to delete wishlist items via the AJAX handler. This chained attack compromises the integrity of user wishlists by allowing unauthorized deletion of items. The vulnerability does not expose confidential data directly but leaks wishlist tokens, which can be leveraged for further unauthorized actions. The CVSS 3.1 base score is 5.3 (medium), reflecting network attack vector, no privileges required, no user interaction, and impact limited to integrity loss without affecting confidentiality or availability. No patches or exploits are currently known, but the vulnerability is publicly disclosed and should be addressed promptly to prevent exploitation.

Potential Impact

The primary impact of CVE-2025-12777 is unauthorized modification of user wishlist data, specifically the deletion of wishlist items by unauthenticated attackers. This compromises data integrity and can disrupt user experience and trust in e-commerce platforms using the affected plugin. While confidentiality and availability are not directly impacted, the ability to manipulate user data without authorization can lead to reputational damage, customer dissatisfaction, and potential financial loss for online retailers. Attackers might also leverage this vulnerability as part of broader attacks targeting user accounts or to cause disruption in e-commerce operations. Organizations relying on YITH WooCommerce Wishlist for customer engagement risk undermining their platform's reliability and security posture if this vulnerability is exploited. The lack of authentication requirements and ease of exploitation increase the threat level, especially for high-traffic e-commerce sites.

Mitigation Recommendations

To mitigate CVE-2025-12777, organizations should immediately update the YITH WooCommerce Wishlist plugin to a version where this vulnerability is fixed once available. In the absence of an official patch, implement custom access controls on the REST API endpoint by replacing the permission_callback '__return_true' with a function that properly verifies user authorization. Additionally, enhance the AJAX delete_item handler to include strict object-level authorization checks ensuring that only authorized users can delete wishlist items. Restrict access to shared wishlist pages and monitor logs for unusual API or AJAX requests indicative of exploitation attempts. Employ Web Application Firewalls (WAFs) with rules targeting suspicious REST API and AJAX calls related to wishlist operations. Regularly audit and review plugin permissions and nonce implementations to ensure they follow best security practices. Finally, educate site administrators about the risks and encourage timely plugin updates and security monitoring.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-05T20:43:52.611Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691d3cbbc00dea8b9c9becc1

Added to database: 11/19/2025, 3:42:51 AM

Last enriched: 2/27/2026, 9:07:35 PM

Last updated: 3/22/2026, 9:16:05 AM

Views: 112

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses