CVE-2025-49319: CWE-862 Missing Authorization in WPFactory Wishlist for WooCommerce
Missing Authorization vulnerability in WPFactory Wishlist for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Wishlist for WooCommerce: from n/a through 3.2.3.
AI Analysis
Technical Summary
CVE-2025-49319 is a Missing Authorization vulnerability (CWE-862) identified in the WPFactory Wishlist for WooCommerce plugin, affecting versions up to 3.2.3. This vulnerability arises from improperly configured access control mechanisms within the plugin, allowing unauthorized users to perform actions that should require authorization. Specifically, the flaw permits exploitation of incorrect access control security levels, potentially enabling an attacker to manipulate wishlist data or perform unauthorized operations without authentication or user interaction. The vulnerability has a CVSS 3.1 base score of 6.5, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L) reveals that the vulnerability is remotely exploitable over the network without any privileges or user interaction, and while it does not compromise confidentiality, it impacts integrity and availability. The lack of a patch or mitigation link at the time of publication suggests that the issue may still be unpatched or in the process of remediation. Given that WooCommerce is a widely used e-commerce platform and the Wishlist plugin is a common add-on to enhance user experience, this vulnerability could be leveraged to disrupt e-commerce operations by unauthorized modification or deletion of wishlist data, potentially affecting customer trust and sales processes.
Potential Impact
For European organizations utilizing WooCommerce with the WPFactory Wishlist plugin, this vulnerability poses a risk to the integrity and availability of wishlist data, which can indirectly affect customer experience and revenue. Attackers exploiting this flaw could manipulate or delete wishlist entries, leading to loss of customer preferences and potential disruption in sales pipelines. Although confidentiality is not directly impacted, the integrity and availability issues could result in reputational damage and operational challenges, especially for online retailers heavily reliant on personalized shopping features. Furthermore, the ease of remote exploitation without authentication increases the risk of automated attacks or exploitation by opportunistic threat actors. Organizations in Europe with significant e-commerce operations using this plugin should be aware of potential service disruptions and customer dissatisfaction stemming from this vulnerability.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify if their WooCommerce installations include the WPFactory Wishlist plugin and identify the version in use. Immediate steps include: 1) Monitoring official WPFactory and WooCommerce channels for security patches or updates addressing CVE-2025-49319 and applying them promptly once available. 2) Implementing Web Application Firewall (WAF) rules to detect and block suspicious requests targeting wishlist functionalities, especially those attempting unauthorized access or modification. 3) Restricting access to wishlist management endpoints via IP whitelisting or other network-level controls where feasible. 4) Conducting thorough access control audits on e-commerce plugins to ensure proper authorization checks are enforced. 5) Educating development and security teams about the risks of missing authorization vulnerabilities and encouraging secure coding practices in plugin development or customization. 6) Considering temporary disabling or replacing the Wishlist plugin if no immediate patch is available and the risk is deemed high. These targeted measures go beyond generic advice by focusing on plugin-specific controls and proactive monitoring.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-49319: CWE-862 Missing Authorization in WPFactory Wishlist for WooCommerce
Description
Missing Authorization vulnerability in WPFactory Wishlist for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Wishlist for WooCommerce: from n/a through 3.2.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-49319 is a Missing Authorization vulnerability (CWE-862) identified in the WPFactory Wishlist for WooCommerce plugin, affecting versions up to 3.2.3. This vulnerability arises from improperly configured access control mechanisms within the plugin, allowing unauthorized users to perform actions that should require authorization. Specifically, the flaw permits exploitation of incorrect access control security levels, potentially enabling an attacker to manipulate wishlist data or perform unauthorized operations without authentication or user interaction. The vulnerability has a CVSS 3.1 base score of 6.5, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L) reveals that the vulnerability is remotely exploitable over the network without any privileges or user interaction, and while it does not compromise confidentiality, it impacts integrity and availability. The lack of a patch or mitigation link at the time of publication suggests that the issue may still be unpatched or in the process of remediation. Given that WooCommerce is a widely used e-commerce platform and the Wishlist plugin is a common add-on to enhance user experience, this vulnerability could be leveraged to disrupt e-commerce operations by unauthorized modification or deletion of wishlist data, potentially affecting customer trust and sales processes.
Potential Impact
For European organizations utilizing WooCommerce with the WPFactory Wishlist plugin, this vulnerability poses a risk to the integrity and availability of wishlist data, which can indirectly affect customer experience and revenue. Attackers exploiting this flaw could manipulate or delete wishlist entries, leading to loss of customer preferences and potential disruption in sales pipelines. Although confidentiality is not directly impacted, the integrity and availability issues could result in reputational damage and operational challenges, especially for online retailers heavily reliant on personalized shopping features. Furthermore, the ease of remote exploitation without authentication increases the risk of automated attacks or exploitation by opportunistic threat actors. Organizations in Europe with significant e-commerce operations using this plugin should be aware of potential service disruptions and customer dissatisfaction stemming from this vulnerability.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify if their WooCommerce installations include the WPFactory Wishlist plugin and identify the version in use. Immediate steps include: 1) Monitoring official WPFactory and WooCommerce channels for security patches or updates addressing CVE-2025-49319 and applying them promptly once available. 2) Implementing Web Application Firewall (WAF) rules to detect and block suspicious requests targeting wishlist functionalities, especially those attempting unauthorized access or modification. 3) Restricting access to wishlist management endpoints via IP whitelisting or other network-level controls where feasible. 4) Conducting thorough access control audits on e-commerce plugins to ensure proper authorization checks are enforced. 5) Educating development and security teams about the risks of missing authorization vulnerabilities and encouraging secure coding practices in plugin development or customization. 6) Considering temporary disabling or replacing the Wishlist plugin if no immediate patch is available and the risk is deemed high. These targeted measures go beyond generic advice by focusing on plugin-specific controls and proactive monitoring.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-06-04T09:42:07.048Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68779109a83201eaacda58b5
Added to database: 7/16/2025, 11:46:17 AM
Last enriched: 7/16/2025, 12:04:34 PM
Last updated: 9/26/2025, 11:41:48 PM
Views: 26
Related Threats
CVE-2025-10499: CWE-352 Cross-Site Request Forgery (CSRF) in kstover Ninja Forms – The Contact Form Builder That Grows With You
MediumCVE-2025-10498: CWE-352 Cross-Site Request Forgery (CSRF) in kstover Ninja Forms – The Contact Form Builder That Grows With You
MediumCVE-2025-8440: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in spwebguy Team Members
MediumCVE-2025-36239: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Storage TS4500 Library
MediumCVE-2025-59945: CWE-266: Incorrect Privilege Assignment in Syslifters sysreptor
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.