Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13157: CWE-639 Authorization Bypass Through User-Controlled Key in qodeinteractive QODE Wishlist for WooCommerce

0
Medium
VulnerabilityCVE-2025-13157cvecve-2025-13157cwe-639
Published: Thu Nov 27 2025 (11/27/2025, 06:42:13 UTC)
Source: CVE Database V5
Vendor/Project: qodeinteractive
Product: QODE Wishlist for WooCommerce

Description

The QODE Wishlist for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.2.7 via the 'qode_wishlist_for_woocommerce_wishlist_table_item_callback' function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to update the public view of arbitrary wishlists.

AI-Powered Analysis

AILast updated: 12/04/2025, 07:24:21 UTC

Technical Analysis

CVE-2025-13157 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the QODE Wishlist for WooCommerce plugin for WordPress. The vulnerability exists in all versions up to and including 1.2.7 within the 'qode_wishlist_for_woocommerce_wishlist_table_item_callback' function. This function fails to properly validate a user-controlled key parameter, which is used to identify wishlist items. Due to this lack of validation, an unauthenticated attacker can manipulate the key to update the public view of arbitrary wishlists belonging to other users. This constitutes an Insecure Direct Object Reference (IDOR) vulnerability, where direct access to internal objects is possible without proper authorization checks. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts integrity (I:L) but not confidentiality or availability. The scope remains unchanged (S:U). Although no public exploits have been reported, the vulnerability could be leveraged to alter wishlist contents, potentially misleading customers or damaging user trust. The plugin is widely used in WooCommerce-based e-commerce sites, which are common in Europe. The vulnerability highlights the importance of validating user input and enforcing strict authorization checks on sensitive operations within web applications.

Potential Impact

For European organizations, particularly e-commerce businesses using WooCommerce with the QODE Wishlist plugin, this vulnerability could lead to unauthorized modification of wishlist data. While it does not expose sensitive personal information or disrupt service availability, the integrity compromise can damage customer trust and brand reputation if wishlists are manipulated maliciously. Attackers could alter wishlist contents to promote or demote products, potentially influencing purchasing decisions or causing confusion. This could indirectly impact sales and customer satisfaction. Since the vulnerability requires no authentication and can be exploited remotely, it increases the attack surface for threat actors targeting online retail platforms. Organizations in Europe with significant WooCommerce deployments, especially in countries with high e-commerce penetration, face a higher risk. Additionally, regulatory frameworks like GDPR emphasize data integrity and user trust, so any manipulation of user-facing data could have compliance implications if it leads to customer harm or misinformation.

Mitigation Recommendations

1. Monitor the QODE Wishlist for WooCommerce plugin updates closely and apply patches immediately once released to address CVE-2025-13157. 2. Until a patch is available, implement server-side access controls to restrict the wishlist management endpoints to authenticated and authorized users only, preventing unauthenticated access. 3. Add custom validation logic to verify that the user requesting wishlist modifications owns the wishlist or has appropriate permissions before processing changes. 4. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious requests attempting to manipulate wishlist keys or parameters. 5. Conduct regular security audits and code reviews of third-party plugins to identify and remediate similar authorization bypass issues proactively. 6. Educate development and security teams on the risks of Insecure Direct Object References and the importance of validating user-controlled inputs. 7. Consider disabling or replacing the vulnerable plugin if immediate patching is not feasible, especially for high-risk environments. 8. Log and monitor wishlist modification activities to detect anomalous behavior that could indicate exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-13T23:05:58.684Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6927f676e2794b4b765ba39b

Added to database: 11/27/2025, 6:57:58 AM

Last enriched: 12/4/2025, 7:24:21 AM

Last updated: 1/11/2026, 12:45:35 PM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats