CVE-2025-67929: Missing Authorization in templateinvaders TI WooCommerce Wishlist
Missing Authorization vulnerability in templateinvaders TI WooCommerce Wishlist ti-woocommerce-wishlist allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects TI WooCommerce Wishlist: from n/a through <= 2.10.0.
AI Analysis
Technical Summary
CVE-2025-67929 identifies a missing authorization vulnerability in the TI WooCommerce Wishlist plugin developed by templateinvaders, affecting all versions up to and including 2.10.0. The vulnerability arises from incorrectly configured access control security levels within the plugin, which is designed to enhance WooCommerce by allowing customers to create and manage wishlists. Due to this misconfiguration, unauthorized users may bypass intended authorization checks, potentially gaining access to restricted wishlist functionalities or data. This could include viewing, modifying, or deleting wishlist entries without proper permissions. The issue does not require user interaction or authentication in some scenarios, increasing its exploitability. Although no CVSS score has been assigned and no active exploits have been reported, the flaw presents a significant risk to the confidentiality and integrity of user data managed by the plugin. TI WooCommerce Wishlist is widely used in WordPress e-commerce sites, making the attack surface substantial. The vulnerability was published on December 16, 2025, and is tracked by Patchstack. No official patches or fixes have been linked yet, emphasizing the need for vigilance and proactive mitigation by site administrators.
Potential Impact
For European organizations, especially those operating e-commerce platforms using WordPress and WooCommerce, this vulnerability poses a considerable threat. Exploitation could lead to unauthorized access to customer wishlist data, potentially exposing sensitive user preferences and behavioral information. This breach of confidentiality can damage customer trust and violate data protection regulations such as GDPR. Additionally, unauthorized modification or deletion of wishlist data can impact data integrity and disrupt user experience, potentially leading to financial losses and reputational harm. Since the plugin is popular among small to medium-sized enterprises across Europe, the scope of affected systems is broad. The ease of exploitation without authentication in some cases increases the risk of automated or targeted attacks. Furthermore, compromised e-commerce sites may serve as entry points for further attacks, including privilege escalation or data exfiltration. The lack of current known exploits provides a window for mitigation but also calls for urgent action to prevent future exploitation.
Mitigation Recommendations
Organizations should immediately inventory their WordPress installations to identify the use of the TI WooCommerce Wishlist plugin and verify the version in use. Until an official patch is released, administrators should consider temporarily disabling the plugin or restricting its access via web application firewalls (WAFs) or access control lists (ACLs). Review and harden access control configurations related to wishlist functionalities, ensuring that only authenticated and authorized users can perform sensitive actions. Monitor logs for unusual access patterns or unauthorized attempts to interact with wishlist endpoints. Stay informed through vendor announcements and security advisories for the release of patches or updates addressing this vulnerability. Additionally, implement a robust backup strategy to recover from potential data tampering. For long-term security, consider employing security plugins that enforce strict authorization checks and conduct regular security audits of all e-commerce plugins. Educate development and IT teams about the risks associated with plugin vulnerabilities and the importance of timely updates.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-67929: Missing Authorization in templateinvaders TI WooCommerce Wishlist
Description
Missing Authorization vulnerability in templateinvaders TI WooCommerce Wishlist ti-woocommerce-wishlist allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects TI WooCommerce Wishlist: from n/a through <= 2.10.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-67929 identifies a missing authorization vulnerability in the TI WooCommerce Wishlist plugin developed by templateinvaders, affecting all versions up to and including 2.10.0. The vulnerability arises from incorrectly configured access control security levels within the plugin, which is designed to enhance WooCommerce by allowing customers to create and manage wishlists. Due to this misconfiguration, unauthorized users may bypass intended authorization checks, potentially gaining access to restricted wishlist functionalities or data. This could include viewing, modifying, or deleting wishlist entries without proper permissions. The issue does not require user interaction or authentication in some scenarios, increasing its exploitability. Although no CVSS score has been assigned and no active exploits have been reported, the flaw presents a significant risk to the confidentiality and integrity of user data managed by the plugin. TI WooCommerce Wishlist is widely used in WordPress e-commerce sites, making the attack surface substantial. The vulnerability was published on December 16, 2025, and is tracked by Patchstack. No official patches or fixes have been linked yet, emphasizing the need for vigilance and proactive mitigation by site administrators.
Potential Impact
For European organizations, especially those operating e-commerce platforms using WordPress and WooCommerce, this vulnerability poses a considerable threat. Exploitation could lead to unauthorized access to customer wishlist data, potentially exposing sensitive user preferences and behavioral information. This breach of confidentiality can damage customer trust and violate data protection regulations such as GDPR. Additionally, unauthorized modification or deletion of wishlist data can impact data integrity and disrupt user experience, potentially leading to financial losses and reputational harm. Since the plugin is popular among small to medium-sized enterprises across Europe, the scope of affected systems is broad. The ease of exploitation without authentication in some cases increases the risk of automated or targeted attacks. Furthermore, compromised e-commerce sites may serve as entry points for further attacks, including privilege escalation or data exfiltration. The lack of current known exploits provides a window for mitigation but also calls for urgent action to prevent future exploitation.
Mitigation Recommendations
Organizations should immediately inventory their WordPress installations to identify the use of the TI WooCommerce Wishlist plugin and verify the version in use. Until an official patch is released, administrators should consider temporarily disabling the plugin or restricting its access via web application firewalls (WAFs) or access control lists (ACLs). Review and harden access control configurations related to wishlist functionalities, ensuring that only authenticated and authorized users can perform sensitive actions. Monitor logs for unusual access patterns or unauthorized attempts to interact with wishlist endpoints. Stay informed through vendor announcements and security advisories for the release of patches or updates addressing this vulnerability. Additionally, implement a robust backup strategy to recover from potential data tampering. For long-term security, consider employing security plugins that enforce strict authorization checks and conduct regular security audits of all e-commerce plugins. Educate development and IT teams about the risks associated with plugin vulnerabilities and the importance of timely updates.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-12-15T09:59:55.700Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69411753594e45819d70ccbe
Added to database: 12/16/2025, 8:24:51 AM
Last enriched: 12/16/2025, 8:45:48 AM
Last updated: 12/18/2025, 12:21:07 PM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10910: CWE-639 Authorization Bypass Through User-Controlled Key in Govee H6056
Critical113,000 Impacted by Data Breach at Virginia Mental Health Authority
MediumCVE-2025-14364: CWE-862 Missing Authorization in kraftplugins Demo Importer Plus
HighCVE-2025-13730: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in daggerhart OpenID Connect Generic Client
MediumCVE-2025-13641: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in smub Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.