Description
The WPC Smart Wishlist for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.0.3 via several wishlist AJAX functions due to missing validation on a user controlled key that is exposed when wishlists are shared. This makes it possible for unauthenticated attackers to empty and add to other user's wishlists, if they have access to the key.
Published: 2025-10-11
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized manipulation of user wishlists via insecure direct object reference
Action: Apply patch
AI Analysis

Impact

The vulnerability resides in the WPC Smart Wishlist for WooCommerce plugin, allowing an unauthenticated attacker to use exposed AJAX endpoints and a user‑controlled key to empty or add items to any shared wishlist. Because the key is not validated, an attacker who knows or guesses the key can perform arbitrary modifications, violating the integrity of other users’ wishlists. This weakness is a classic instance of CWE‑639: Insufficient Verification of Permissions Before Performing an Action.

Affected Systems

Affects the WordPress plugin WPC Smart Wishlist for WooCommerce, versions up to and including 5.0.3, installed on any WordPress site that uses the plugin and permits shared wishlists.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, while the EPSS score of less than 1% suggests a low probability of widespread exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw by sending crafted AJAX requests with a known key, thus achieving unauthenticated wishlist manipulation without requiring user authentication or elevated privileges.

Generated by OpenCVE AI on April 21, 2026 at 02:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the WPC Smart Wishlist for WooCommerce plugin to version 5.0.4 or later, which removes the exposed key from shared wishlists and adds proper permission checks on AJAX handlers.
  • If an immediate upgrade is not possible, disable the shared wishlist feature or restrict access to the affected AJAX endpoints so that only authenticated owners can manipulate wishlists.
  • Implement additional server‑side validation to ensure that any key used to identify a wishlist is bound to the requesting user's session and not supplied by an external user.

Generated by OpenCVE AI on April 21, 2026 at 02:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Oct 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wpclever
Wpclever wpc Smart Wishlist For Woocommerce
Vendors & Products Wordpress
Wordpress wordpress
Wpclever
Wpclever wpc Smart Wishlist For Woocommerce

Tue, 14 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 11 Oct 2025 08:45:00 +0000

Type Values Removed Values Added
Description The WPC Smart Wishlist for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.0.3 via several wishlist AJAX functions due to missing validation on a user controlled key that is exposed when wishlists are shared. This makes it possible for unauthenticated attackers to empty and add to other user's wishlists, if they have access to the key.
Title WPC Smart Wishlist for WooCommerce <= 5.0.3 - Insecure Direct Object Reference to Unauthenticated Wishlist Manipulation
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
Wpclever Wpc Smart Wishlist For Woocommerce
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:15:42.132Z

Reserved: 2025-10-08T15:58:42.951Z

Link: CVE-2025-11518

cve-icon Vulnrichment

Updated: 2025-10-14T13:30:30.314Z

cve-icon NVD

Status : Deferred

Published: 2025-10-11T09:15:32.653

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11518

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T02:30:25Z

Weaknesses