CVE-2025-13157: CWE-639 Authorization Bypass Through User-Controlled Key in qodeinteractive QODE Wishlist for WooCommerce
The QODE Wishlist for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.2.7 via the 'qode_wishlist_for_woocommerce_wishlist_table_item_callback' function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to update the public view of arbitrary wishlists.
AI Analysis
Technical Summary
CVE-2025-13157 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the QODE Wishlist for WooCommerce plugin for WordPress. The vulnerability exists in all versions up to and including 1.2.7 within the 'qode_wishlist_for_woocommerce_wishlist_table_item_callback' function. This function fails to properly validate a user-controlled key parameter, which is used to identify wishlist items. Due to this lack of validation, an unauthenticated attacker can manipulate the key to update the public view of arbitrary wishlists belonging to other users. This constitutes an Insecure Direct Object Reference (IDOR) vulnerability, where direct access to internal objects is possible without proper authorization checks. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts integrity (I:L) but not confidentiality or availability. The scope remains unchanged (S:U). Although no public exploits have been reported, the vulnerability could be leveraged to alter wishlist contents, potentially misleading customers or damaging user trust. The plugin is widely used in WooCommerce-based e-commerce sites, which are common in Europe. The vulnerability highlights the importance of validating user input and enforcing strict authorization checks on sensitive operations within web applications.
Potential Impact
For European organizations, particularly e-commerce businesses using WooCommerce with the QODE Wishlist plugin, this vulnerability could lead to unauthorized modification of wishlist data. While it does not expose sensitive personal information or disrupt service availability, the integrity compromise can damage customer trust and brand reputation if wishlists are manipulated maliciously. Attackers could alter wishlist contents to promote or demote products, potentially influencing purchasing decisions or causing confusion. This could indirectly impact sales and customer satisfaction. Since the vulnerability requires no authentication and can be exploited remotely, it increases the attack surface for threat actors targeting online retail platforms. Organizations in Europe with significant WooCommerce deployments, especially in countries with high e-commerce penetration, face a higher risk. Additionally, regulatory frameworks like GDPR emphasize data integrity and user trust, so any manipulation of user-facing data could have compliance implications if it leads to customer harm or misinformation.
Mitigation Recommendations
1. Monitor the QODE Wishlist for WooCommerce plugin updates closely and apply patches immediately once released to address CVE-2025-13157. 2. Until a patch is available, implement server-side access controls to restrict the wishlist management endpoints to authenticated and authorized users only, preventing unauthenticated access. 3. Add custom validation logic to verify that the user requesting wishlist modifications owns the wishlist or has appropriate permissions before processing changes. 4. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious requests attempting to manipulate wishlist keys or parameters. 5. Conduct regular security audits and code reviews of third-party plugins to identify and remediate similar authorization bypass issues proactively. 6. Educate development and security teams on the risks of Insecure Direct Object References and the importance of validating user-controlled inputs. 7. Consider disabling or replacing the vulnerable plugin if immediate patching is not feasible, especially for high-risk environments. 8. Log and monitor wishlist modification activities to detect anomalous behavior that could indicate exploitation attempts.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2025-13157: CWE-639 Authorization Bypass Through User-Controlled Key in qodeinteractive QODE Wishlist for WooCommerce
Description
The QODE Wishlist for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.2.7 via the 'qode_wishlist_for_woocommerce_wishlist_table_item_callback' function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to update the public view of arbitrary wishlists.
AI-Powered Analysis
Technical Analysis
CVE-2025-13157 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the QODE Wishlist for WooCommerce plugin for WordPress. The vulnerability exists in all versions up to and including 1.2.7 within the 'qode_wishlist_for_woocommerce_wishlist_table_item_callback' function. This function fails to properly validate a user-controlled key parameter, which is used to identify wishlist items. Due to this lack of validation, an unauthenticated attacker can manipulate the key to update the public view of arbitrary wishlists belonging to other users. This constitutes an Insecure Direct Object Reference (IDOR) vulnerability, where direct access to internal objects is possible without proper authorization checks. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts integrity (I:L) but not confidentiality or availability. The scope remains unchanged (S:U). Although no public exploits have been reported, the vulnerability could be leveraged to alter wishlist contents, potentially misleading customers or damaging user trust. The plugin is widely used in WooCommerce-based e-commerce sites, which are common in Europe. The vulnerability highlights the importance of validating user input and enforcing strict authorization checks on sensitive operations within web applications.
Potential Impact
For European organizations, particularly e-commerce businesses using WooCommerce with the QODE Wishlist plugin, this vulnerability could lead to unauthorized modification of wishlist data. While it does not expose sensitive personal information or disrupt service availability, the integrity compromise can damage customer trust and brand reputation if wishlists are manipulated maliciously. Attackers could alter wishlist contents to promote or demote products, potentially influencing purchasing decisions or causing confusion. This could indirectly impact sales and customer satisfaction. Since the vulnerability requires no authentication and can be exploited remotely, it increases the attack surface for threat actors targeting online retail platforms. Organizations in Europe with significant WooCommerce deployments, especially in countries with high e-commerce penetration, face a higher risk. Additionally, regulatory frameworks like GDPR emphasize data integrity and user trust, so any manipulation of user-facing data could have compliance implications if it leads to customer harm or misinformation.
Mitigation Recommendations
1. Monitor the QODE Wishlist for WooCommerce plugin updates closely and apply patches immediately once released to address CVE-2025-13157. 2. Until a patch is available, implement server-side access controls to restrict the wishlist management endpoints to authenticated and authorized users only, preventing unauthenticated access. 3. Add custom validation logic to verify that the user requesting wishlist modifications owns the wishlist or has appropriate permissions before processing changes. 4. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious requests attempting to manipulate wishlist keys or parameters. 5. Conduct regular security audits and code reviews of third-party plugins to identify and remediate similar authorization bypass issues proactively. 6. Educate development and security teams on the risks of Insecure Direct Object References and the importance of validating user-controlled inputs. 7. Consider disabling or replacing the vulnerable plugin if immediate patching is not feasible, especially for high-risk environments. 8. Log and monitor wishlist modification activities to detect anomalous behavior that could indicate exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-13T23:05:58.684Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6927f676e2794b4b765ba39b
Added to database: 11/27/2025, 6:57:58 AM
Last enriched: 12/4/2025, 7:24:21 AM
Last updated: 1/11/2026, 12:45:35 PM
Views: 80
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15506: Out-of-Bounds Read in AcademySoftwareFoundation OpenColorIO
MediumYARA-X 1.11.0 Release: Hash Function Warnings, (Sun, Jan 11th)
MediumCVE-2026-0843: SQL Injection in jiujiujia jjjfood
MediumCVE-2026-0842: Missing Authentication in Flycatcher Toys smART Sketcher
MediumCVE-2026-0841: Buffer Overflow in UTT 进取 520W
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.