Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12777: CWE-285 Improper Authorization in yithemes YITH WooCommerce Wishlist

0
Medium
VulnerabilityCVE-2025-12777cvecve-2025-12777cwe-285
Published: Wed Nov 19 2025 (11/19/2025, 03:29:38 UTC)
Source: CVE Database V5
Vendor/Project: yithemes
Product: YITH WooCommerce Wishlist

Description

The YITH WooCommerce Wishlist plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 4.10.0. This is due to the plugin not properly verifying that a user is authorized to perform actions on the REST API /wp-json/yith/wishlist/v1/lists endpoint (which uses permission_callback => '__return_true') and the AJAX delete_item handler (which only checks nonce validity without verifying object-level authorization). This makes it possible for unauthenticated attackers to disclose wishlist tokens for any user and subsequently delete wishlist items by chaining the REST API authorization bypass with the exposed delete_item nonce on shared wishlist pages and the AJAX handler's missing object-level authorization check.

AI-Powered Analysis

AILast updated: 11/26/2025, 04:45:03 UTC

Technical Analysis

CVE-2025-12777 is a medium severity authorization bypass vulnerability affecting the YITH WooCommerce Wishlist plugin for WordPress, specifically all versions up to 4.10.0. The root cause is improper authorization checks on two critical components: the REST API endpoint /wp-json/yith/wishlist/v1/lists and the AJAX delete_item handler. The REST API endpoint uses a permission_callback set to '__return_true', effectively disabling any authorization checks and allowing unauthenticated users to access wishlist data, including sensitive wishlist tokens. Meanwhile, the AJAX delete_item handler validates only the nonce for request authenticity but lacks object-level authorization verification, meaning it does not confirm whether the requester has permission to delete the targeted wishlist item. An attacker can exploit this by first retrieving wishlist tokens via the REST API, then using those tokens combined with the nonce from shared wishlist pages to delete wishlist items belonging to other users. This chain of flaws leads to unauthorized integrity violations, specifically the deletion of wishlist entries without authentication or proper authorization. The vulnerability does not expose confidential data directly but compromises data integrity and user trust. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) indicates network attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, no confidentiality or availability impact, but partial integrity impact. No patches or known exploits are currently available, so mitigation relies on configuration changes or plugin updates once released.

Potential Impact

For European organizations operating e-commerce websites using WordPress with the YITH WooCommerce Wishlist plugin, this vulnerability poses a risk to the integrity of user data. Attackers can delete wishlist items of any user without authentication, potentially disrupting customer experience and trust. While no direct confidentiality breach occurs, the ability to manipulate user wishlists can lead to reputational damage, customer dissatisfaction, and potential loss of sales. In regulated sectors, such as retail or consumer protection-focused jurisdictions within Europe, failure to address such vulnerabilities could also attract regulatory scrutiny under GDPR if user trust and service integrity are compromised. The impact is particularly relevant for high-traffic online stores relying on wishlist features for marketing and sales strategies. Since the vulnerability requires no user interaction or privileges, it can be exploited remotely and at scale, increasing risk exposure. However, the lack of known exploits in the wild currently reduces immediate threat levels but does not eliminate future risk.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence and version of the YITH WooCommerce Wishlist plugin. Until an official patch is released, administrators should consider disabling the wishlist functionality or restricting access to the REST API endpoints related to the wishlist via web application firewalls (WAF) or server-level access controls. Implementing strict access controls on the /wp-json/yith/wishlist/v1/lists endpoint to require authentication and proper authorization checks can mitigate unauthorized access. Additionally, reviewing and tightening nonce validation and adding object-level authorization checks in custom code or plugin overrides can reduce risk. Monitoring web logs for suspicious access patterns targeting the wishlist endpoints is recommended. Once a vendor patch becomes available, prompt application of updates is critical. Organizations should also educate their development and security teams about the risks of improper authorization in REST APIs and AJAX handlers to prevent similar issues in custom plugins or themes.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-05T20:43:52.611Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691d3cbbc00dea8b9c9becc1

Added to database: 11/19/2025, 3:42:51 AM

Last enriched: 11/26/2025, 4:45:03 AM

Last updated: 1/7/2026, 5:25:16 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats