Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68024: Missing Authorization in Addonify Addonify – WooCommerce Wishlist

0
High
VulnerabilityCVE-2025-68024cvecve-2025-68024
Published: Fri Feb 20 2026 (02/20/2026, 15:46:35 UTC)
Source: CVE Database V5
Vendor/Project: Addonify
Product: Addonify – WooCommerce Wishlist

Description

CVE-2025-68024 is a missing authorization vulnerability in the Addonify – WooCommerce Wishlist plugin versions up to 2. 0. 15. This flaw allows attackers to bypass access controls due to incorrectly configured security levels, potentially enabling unauthorized actions within the plugin. The vulnerability affects WooCommerce stores using this addon, which is popular for wishlist functionality. No public exploits are currently known, and no CVSS score has been assigned. The absence of proper authorization checks can lead to unauthorized data manipulation or disclosure. Exploitation does not require user interaction but may require knowledge of the plugin's endpoints. Organizations running WooCommerce with this plugin are at risk, especially e-commerce sites relying on wishlist features. Immediate patching or mitigation is advised once updates become available.

AI-Powered Analysis

AILast updated: 02/20/2026, 21:18:14 UTC

Technical Analysis

CVE-2025-68024 identifies a missing authorization vulnerability in the Addonify – WooCommerce Wishlist plugin, specifically affecting versions up to and including 2.0.15. The vulnerability arises from incorrectly configured access control mechanisms within the plugin, which fail to properly verify whether a user has the necessary permissions to perform certain actions. This flaw can be exploited by an attacker to bypass security controls, potentially allowing unauthorized users to access or manipulate wishlist data or related functionality. Since WooCommerce is a widely used e-commerce platform, and the Addonify Wishlist plugin is a popular extension for adding wishlist capabilities, this vulnerability can impact a broad range of online stores. The technical details do not specify the exact nature of the unauthorized actions possible, but missing authorization typically enables attackers to perform operations reserved for authenticated or privileged users, such as viewing or modifying wishlist entries of other users. No public exploits have been reported yet, and no CVSS score has been assigned, indicating that the vulnerability is newly disclosed and may not yet be widely weaponized. The vulnerability does not require user interaction, increasing the risk of automated exploitation. The lack of patch links suggests that a fix may not yet be available, underscoring the need for vigilance and interim mitigations. The vulnerability was reserved in December 2025 and published in February 2026, reflecting recent discovery and disclosure.

Potential Impact

The missing authorization vulnerability in the Addonify Wishlist plugin can have significant impacts on organizations operating WooCommerce-based e-commerce sites. Unauthorized access to wishlist data can lead to privacy violations, exposing customer preferences and potentially sensitive information. Attackers might manipulate wishlist contents, causing confusion or fraudulent activity, which can degrade customer trust and damage brand reputation. In some scenarios, unauthorized actions could be leveraged as a foothold for further attacks within the e-commerce environment, including privilege escalation or data tampering. The vulnerability could also disrupt normal business operations if exploited at scale, affecting availability or integrity of wishlist features. Given the widespread use of WooCommerce globally, the scope of affected systems is substantial. Although no exploits are currently known in the wild, the ease of exploitation due to missing authorization and lack of user interaction requirements increases the risk of future attacks. Organizations failing to address this vulnerability may face regulatory compliance issues related to data protection and security best practices.

Mitigation Recommendations

Organizations should immediately audit their WooCommerce installations to identify if the Addonify – WooCommerce Wishlist plugin version 2.0.15 or earlier is in use. Until an official patch is released, administrators should consider disabling the plugin to prevent exploitation. Implementing web application firewall (WAF) rules to restrict access to wishlist-related endpoints can help mitigate unauthorized requests. Monitoring logs for unusual access patterns or unauthorized attempts targeting wishlist functionality is critical. Restricting access to the WordPress admin and plugin management interfaces through IP whitelisting or multi-factor authentication can reduce risk. Developers and site administrators should follow up with Addonify for updates or patches and apply them promptly once available. Additionally, reviewing and tightening overall access control policies within WooCommerce and related plugins can prevent similar issues. Educating staff on the risks of plugin vulnerabilities and maintaining a robust patch management process are also recommended.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-15T10:00:59.034Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6998c9edbe58cf853bab8525

Added to database: 2/20/2026, 8:54:05 PM

Last enriched: 2/20/2026, 9:18:14 PM

Last updated: 2/21/2026, 5:46:28 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats