CVE-2025-58247: CWE-862 Missing Authorization in templateinvaders TI WooCommerce Wishlist
Missing Authorization vulnerability in templateinvaders TI WooCommerce Wishlist allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects TI WooCommerce Wishlist: from n/a through 2.10.0.
AI Analysis
Technical Summary
CVE-2025-58247 is a medium-severity vulnerability classified under CWE-862 (Missing Authorization) affecting the TI WooCommerce Wishlist plugin developed by templateinvaders. This vulnerability arises due to improperly configured access control mechanisms within the plugin, allowing unauthorized users to exploit certain functionalities without the necessary permissions. Specifically, the flaw permits attackers to bypass authorization checks, potentially enabling them to access or manipulate wishlist-related features that should be restricted. The vulnerability affects all versions of the TI WooCommerce Wishlist plugin up to and including version 2.10.0. According to the CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N), the attack can be executed remotely over the network without requiring any privileges or user interaction. The impact is limited to a low confidentiality breach, with no direct effect on integrity or availability. No known exploits are currently reported in the wild, and no patches have been published at the time of this analysis. The vulnerability was reserved in late August 2025 and published in September 2025, indicating recent discovery and disclosure.
Potential Impact
For European organizations, the vulnerability poses a risk primarily to e-commerce platforms utilizing the TI WooCommerce Wishlist plugin. Unauthorized access to wishlist data could lead to exposure of customer preferences and potentially sensitive information related to shopping habits, which may infringe on privacy regulations such as GDPR. Although the vulnerability does not directly compromise data integrity or availability, the confidentiality breach could undermine customer trust and result in reputational damage. Additionally, attackers might leverage the unauthorized access as a foothold for further reconnaissance or social engineering attacks. Given the widespread use of WooCommerce in Europe, especially among small to medium-sized enterprises (SMEs) operating online retail stores, the vulnerability could affect a significant number of businesses if left unmitigated.
Mitigation Recommendations
Organizations should immediately verify if they are using the TI WooCommerce Wishlist plugin and identify the version in use. Until an official patch is released, it is advisable to restrict access to wishlist functionalities through web application firewalls (WAFs) or custom access control rules that enforce user authentication and authorization checks. Monitoring web server logs for unusual access patterns targeting wishlist endpoints can help detect exploitation attempts. Additionally, applying the principle of least privilege on user roles within the WooCommerce environment can limit potential damage. Once a patch becomes available, prompt updating of the plugin is critical. For organizations with development capabilities, reviewing and hardening the plugin’s authorization logic or temporarily disabling the wishlist feature may be necessary to prevent exploitation.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-58247: CWE-862 Missing Authorization in templateinvaders TI WooCommerce Wishlist
Description
Missing Authorization vulnerability in templateinvaders TI WooCommerce Wishlist allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects TI WooCommerce Wishlist: from n/a through 2.10.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-58247 is a medium-severity vulnerability classified under CWE-862 (Missing Authorization) affecting the TI WooCommerce Wishlist plugin developed by templateinvaders. This vulnerability arises due to improperly configured access control mechanisms within the plugin, allowing unauthorized users to exploit certain functionalities without the necessary permissions. Specifically, the flaw permits attackers to bypass authorization checks, potentially enabling them to access or manipulate wishlist-related features that should be restricted. The vulnerability affects all versions of the TI WooCommerce Wishlist plugin up to and including version 2.10.0. According to the CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N), the attack can be executed remotely over the network without requiring any privileges or user interaction. The impact is limited to a low confidentiality breach, with no direct effect on integrity or availability. No known exploits are currently reported in the wild, and no patches have been published at the time of this analysis. The vulnerability was reserved in late August 2025 and published in September 2025, indicating recent discovery and disclosure.
Potential Impact
For European organizations, the vulnerability poses a risk primarily to e-commerce platforms utilizing the TI WooCommerce Wishlist plugin. Unauthorized access to wishlist data could lead to exposure of customer preferences and potentially sensitive information related to shopping habits, which may infringe on privacy regulations such as GDPR. Although the vulnerability does not directly compromise data integrity or availability, the confidentiality breach could undermine customer trust and result in reputational damage. Additionally, attackers might leverage the unauthorized access as a foothold for further reconnaissance or social engineering attacks. Given the widespread use of WooCommerce in Europe, especially among small to medium-sized enterprises (SMEs) operating online retail stores, the vulnerability could affect a significant number of businesses if left unmitigated.
Mitigation Recommendations
Organizations should immediately verify if they are using the TI WooCommerce Wishlist plugin and identify the version in use. Until an official patch is released, it is advisable to restrict access to wishlist functionalities through web application firewalls (WAFs) or custom access control rules that enforce user authentication and authorization checks. Monitoring web server logs for unusual access patterns targeting wishlist endpoints can help detect exploitation attempts. Additionally, applying the principle of least privilege on user roles within the WooCommerce environment can limit potential damage. Once a patch becomes available, prompt updating of the plugin is critical. For organizations with development capabilities, reviewing and hardening the plugin’s authorization logic or temporarily disabling the wishlist feature may be necessary to prevent exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-08-27T16:19:44.959Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d194cea6a0abbafb7a3bd0
Added to database: 9/22/2025, 6:26:22 PM
Last enriched: 9/30/2025, 1:10:23 AM
Last updated: 10/7/2025, 1:41:32 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Hackers Stole Data From Public Safety Comms Firm BK Technologies
MediumCVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.