Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58247: CWE-862 Missing Authorization in templateinvaders TI WooCommerce Wishlist

0
Medium
VulnerabilityCVE-2025-58247cvecve-2025-58247cwe-862
Published: Mon Sep 22 2025 (09/22/2025, 18:23:31 UTC)
Source: CVE Database V5
Vendor/Project: templateinvaders
Product: TI WooCommerce Wishlist

Description

Missing Authorization vulnerability in templateinvaders TI WooCommerce Wishlist allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects TI WooCommerce Wishlist: from n/a through 2.10.0.

AI-Powered Analysis

AILast updated: 09/30/2025, 01:10:23 UTC

Technical Analysis

CVE-2025-58247 is a medium-severity vulnerability classified under CWE-862 (Missing Authorization) affecting the TI WooCommerce Wishlist plugin developed by templateinvaders. This vulnerability arises due to improperly configured access control mechanisms within the plugin, allowing unauthorized users to exploit certain functionalities without the necessary permissions. Specifically, the flaw permits attackers to bypass authorization checks, potentially enabling them to access or manipulate wishlist-related features that should be restricted. The vulnerability affects all versions of the TI WooCommerce Wishlist plugin up to and including version 2.10.0. According to the CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N), the attack can be executed remotely over the network without requiring any privileges or user interaction. The impact is limited to a low confidentiality breach, with no direct effect on integrity or availability. No known exploits are currently reported in the wild, and no patches have been published at the time of this analysis. The vulnerability was reserved in late August 2025 and published in September 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, the vulnerability poses a risk primarily to e-commerce platforms utilizing the TI WooCommerce Wishlist plugin. Unauthorized access to wishlist data could lead to exposure of customer preferences and potentially sensitive information related to shopping habits, which may infringe on privacy regulations such as GDPR. Although the vulnerability does not directly compromise data integrity or availability, the confidentiality breach could undermine customer trust and result in reputational damage. Additionally, attackers might leverage the unauthorized access as a foothold for further reconnaissance or social engineering attacks. Given the widespread use of WooCommerce in Europe, especially among small to medium-sized enterprises (SMEs) operating online retail stores, the vulnerability could affect a significant number of businesses if left unmitigated.

Mitigation Recommendations

Organizations should immediately verify if they are using the TI WooCommerce Wishlist plugin and identify the version in use. Until an official patch is released, it is advisable to restrict access to wishlist functionalities through web application firewalls (WAFs) or custom access control rules that enforce user authentication and authorization checks. Monitoring web server logs for unusual access patterns targeting wishlist endpoints can help detect exploitation attempts. Additionally, applying the principle of least privilege on user roles within the WooCommerce environment can limit potential damage. Once a patch becomes available, prompt updating of the plugin is critical. For organizations with development capabilities, reviewing and hardening the plugin’s authorization logic or temporarily disabling the wishlist feature may be necessary to prevent exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-08-27T16:19:44.959Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d194cea6a0abbafb7a3bd0

Added to database: 9/22/2025, 6:26:22 PM

Last enriched: 9/30/2025, 1:10:23 AM

Last updated: 10/7/2025, 1:41:32 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats