Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13440: CWE-862 Missing Authorization in premmerce Premmerce Wishlist for WooCommerce

0
Medium
VulnerabilityCVE-2025-13440cvecve-2025-13440cwe-862
Published: Fri Dec 12 2025 (12/12/2025, 03:20:50 UTC)
Source: CVE Database V5
Vendor/Project: premmerce
Product: Premmerce Wishlist for WooCommerce

Description

The Premmerce Wishlist for WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.1.10. This is due to a missing capability check on the deleteWishlist() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary wishlists.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 09:52:29 UTC

Technical Analysis

CVE-2025-13440 identifies a Missing Authorization vulnerability (CWE-862) in the Premmerce Wishlist for WooCommerce plugin for WordPress, specifically in all versions up to and including 1.1.10. The vulnerability stems from the absence of a capability check in the deleteWishlist() function, which is responsible for handling wishlist deletions. This flaw allows any authenticated user with at least Subscriber-level privileges to invoke this function and delete arbitrary wishlists belonging to other users. Since Subscriber-level access is commonly granted to registered users on WordPress sites, this vulnerability significantly lowers the barrier for exploitation. The vulnerability does not require elevated privileges such as Administrator or Editor roles, nor does it require additional user interaction beyond authentication. The CVSS 3.1 base score is 5.3 (medium severity), reflecting the fact that the attack vector is network-based, with low attack complexity, no privileges required beyond Subscriber, no user interaction, and impacts only integrity without affecting confidentiality or availability. No patches or fixes have been published at the time of disclosure, and no known exploits are reported in the wild. The vulnerability could be exploited to disrupt user experience and trust by deleting wishlists, which may impact e-commerce operations relying on this plugin. The plugin is widely used in WooCommerce-powered WordPress e-commerce sites, making this vulnerability relevant to a broad range of online retailers.

Potential Impact

The primary impact of CVE-2025-13440 is the unauthorized deletion of wishlist data, which compromises data integrity and user trust. While it does not expose sensitive information or cause denial of service, the ability for low-privileged authenticated users to delete arbitrary wishlists can disrupt customer experience and potentially lead to loss of sales or customer dissatisfaction. For e-commerce businesses relying on wishlists as part of their sales funnel, this could translate into reduced revenue and reputational damage. Additionally, attackers could use this vulnerability to target specific users or perform harassment by deleting their saved items. Since the vulnerability requires only Subscriber-level access, it can be exploited by any registered user or potentially by attackers who create accounts on the affected sites. The scope is limited to sites using the Premmerce Wishlist plugin, but given WooCommerce's significant market share in e-commerce, the affected population is substantial. The lack of patches increases the window of exposure, and organizations may face operational challenges until a fix is available.

Mitigation Recommendations

To mitigate CVE-2025-13440, organizations should implement the following specific actions: 1) Immediately audit user roles and permissions to ensure that Subscriber-level users have minimal capabilities and consider restricting account creation if possible. 2) Temporarily disable or remove the Premmerce Wishlist plugin until a patch is released, especially if wishlists are not critical to business operations. 3) Monitor logs for suspicious wishlist deletion activities, focusing on actions performed by Subscriber-level users. 4) Implement web application firewall (WAF) rules to detect and block unauthorized requests targeting the deleteWishlist() function or related endpoints. 5) Engage with the plugin vendor or community to track the release of security patches and apply updates promptly. 6) Consider custom development or patching to add capability checks on the deleteWishlist() function if immediate patching is not available. 7) Educate site administrators and users about the risk and encourage strong authentication practices to prevent account compromise. These measures go beyond generic advice by focusing on role auditing, monitoring, and temporary disabling of the vulnerable component.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-19T19:06:21.133Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693b9183650da22753edbb25

Added to database: 12/12/2025, 3:52:35 AM

Last enriched: 2/27/2026, 9:52:29 AM

Last updated: 3/25/2026, 3:58:09 PM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses