CVE-2025-12777
BaseFortify
Publication date: 2025-11-19
Last updated on: 2025-11-19
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| yith | woocommerce_wishlist | 4.10.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-285 | The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in the YITH WooCommerce Wishlist plugin for WordPress allows unauthorized users to bypass authorization checks on the REST API endpoint /wp-json/yith/wishlist/v1/lists and the AJAX delete_item handler. This happens because the plugin does not properly verify if a user is authorized to perform actions, using a permission callback that always returns true and only checking nonce validity without verifying object-level authorization. As a result, unauthenticated attackers can disclose wishlist tokens for any user and delete wishlist items by exploiting these flaws.
How can this vulnerability impact me? :
This vulnerability can allow unauthenticated attackers to access wishlist tokens of any user and delete wishlist items without proper authorization. This could lead to unauthorized modification or deletion of user data related to wishlists, potentially causing data loss or disruption of user experience on affected WordPress sites using the vulnerable plugin.