Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67929: Missing Authorization in templateinvaders TI WooCommerce Wishlist

0
Medium
VulnerabilityCVE-2025-67929cvecve-2025-67929
Published: Tue Dec 16 2025 (12/16/2025, 08:12:57 UTC)
Source: CVE Database V5
Vendor/Project: templateinvaders
Product: TI WooCommerce Wishlist

Description

Missing Authorization vulnerability in templateinvaders TI WooCommerce Wishlist ti-woocommerce-wishlist allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects TI WooCommerce Wishlist: from n/a through <= 2.10.0.

AI-Powered Analysis

AILast updated: 12/16/2025, 08:45:48 UTC

Technical Analysis

CVE-2025-67929 identifies a missing authorization vulnerability in the TI WooCommerce Wishlist plugin developed by templateinvaders, affecting all versions up to and including 2.10.0. The vulnerability arises from incorrectly configured access control security levels within the plugin, which is designed to enhance WooCommerce by allowing customers to create and manage wishlists. Due to this misconfiguration, unauthorized users may bypass intended authorization checks, potentially gaining access to restricted wishlist functionalities or data. This could include viewing, modifying, or deleting wishlist entries without proper permissions. The issue does not require user interaction or authentication in some scenarios, increasing its exploitability. Although no CVSS score has been assigned and no active exploits have been reported, the flaw presents a significant risk to the confidentiality and integrity of user data managed by the plugin. TI WooCommerce Wishlist is widely used in WordPress e-commerce sites, making the attack surface substantial. The vulnerability was published on December 16, 2025, and is tracked by Patchstack. No official patches or fixes have been linked yet, emphasizing the need for vigilance and proactive mitigation by site administrators.

Potential Impact

For European organizations, especially those operating e-commerce platforms using WordPress and WooCommerce, this vulnerability poses a considerable threat. Exploitation could lead to unauthorized access to customer wishlist data, potentially exposing sensitive user preferences and behavioral information. This breach of confidentiality can damage customer trust and violate data protection regulations such as GDPR. Additionally, unauthorized modification or deletion of wishlist data can impact data integrity and disrupt user experience, potentially leading to financial losses and reputational harm. Since the plugin is popular among small to medium-sized enterprises across Europe, the scope of affected systems is broad. The ease of exploitation without authentication in some cases increases the risk of automated or targeted attacks. Furthermore, compromised e-commerce sites may serve as entry points for further attacks, including privilege escalation or data exfiltration. The lack of current known exploits provides a window for mitigation but also calls for urgent action to prevent future exploitation.

Mitigation Recommendations

Organizations should immediately inventory their WordPress installations to identify the use of the TI WooCommerce Wishlist plugin and verify the version in use. Until an official patch is released, administrators should consider temporarily disabling the plugin or restricting its access via web application firewalls (WAFs) or access control lists (ACLs). Review and harden access control configurations related to wishlist functionalities, ensuring that only authenticated and authorized users can perform sensitive actions. Monitor logs for unusual access patterns or unauthorized attempts to interact with wishlist endpoints. Stay informed through vendor announcements and security advisories for the release of patches or updates addressing this vulnerability. Additionally, implement a robust backup strategy to recover from potential data tampering. For long-term security, consider employing security plugins that enforce strict authorization checks and conduct regular security audits of all e-commerce plugins. Educate development and IT teams about the risks associated with plugin vulnerabilities and the importance of timely updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-15T09:59:55.700Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69411753594e45819d70ccbe

Added to database: 12/16/2025, 8:24:51 AM

Last enriched: 12/16/2025, 8:45:48 AM

Last updated: 12/18/2025, 12:21:07 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats