The Wisly plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.0.0 due to missing validation on the 'wishlist_id' user controlled key. This makes it possible for unauthenticated attackers to remove and add items to other user's wishlists.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 11 Nov 2025 03:45:00 +0000

Type Values Removed Values Added
Description The Wisly plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.0.0 due to missing validation on the 'wishlist_id' user controlled key. This makes it possible for unauthenticated attackers to remove and add items to other user's wishlists.
Title Wisly <= 1.0.0 - Insecure Direct Object Reference to Unauthenticated Wishlist Manipulation
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-11-11T03:30:47.370Z

Reserved: 2025-10-08T19:14:04.214Z

Link: CVE-2025-11532

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-11-11T04:15:41.953

Modified: 2025-11-11T04:15:41.953

Link: CVE-2025-11532

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.