Description
The WPC Smart Wishlist for WooCommerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'wishlist_quickview' AJAX action in all versions up to, and including, 5.0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view other user's wishlist data and information.
Published: 2025-10-18
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure to Authenticated Users
Action: Patch
AI Analysis

Impact

The vulnerability lies in the WPC Smart Wishlist for WooCommerce plugin where the AJAX endpoint 'wishlist_quickview' lacks the necessary capability check for the 'wishlist_quickview' action. This omission allows an authenticated WordPress user who holds at least a Subscriber role to request and view another user's wishlist data, including item details and personal information that should remain private. The weakness is defined as a missing authorization (CWE-862).

Affected Systems

The affected product is WPC Smart Wishlist for WooCommerce (wpclever) in all releases up to and including version 5.0.4. Users running any version 5.0.4 or older are vulnerable regardless of how many sites or users they host.

Risk and Exploitability

The CVSS score of 4.3 categorizes the vulnerability as Low. The EPSS score of less than 1% suggests that exploitation is unlikely but not impossible. The advisory notes that the issue is not listed in CISA's KEV catalog. The attack requires an authenticated user with Subscriber role or higher, who can then send AJAX requests to the 'wishlist_quickview' endpoint to retrieve another user’s wishlist information.

Generated by OpenCVE AI on April 22, 2026 at 12:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the WPC Smart Wishlist for WooCommerce plugin to version 5.0.5 or higher, which includes the missing capability check on the wishlist_quickview action.
  • Verify all installed plugins are up to date and review permissions for other plugins to ensure they do not expose similar data via AJAX endpoints.
  • If an upgrade is not immediately possible, limit the access rights of Subscriber users by adjusting role capabilities so they cannot execute the 'wishlist_quickview' action until a patch is applied.

Generated by OpenCVE AI on April 22, 2026 at 12:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Oct 2025 20:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Oct 2025 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wpclever
Wpclever wpc Smart Wishlist For Woocommerce
Vendors & Products Wordpress
Wordpress wordpress
Wpclever
Wpclever wpc Smart Wishlist For Woocommerce

Sat, 18 Oct 2025 05:45:00 +0000

Type Values Removed Values Added
Description The WPC Smart Wishlist for WooCommerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'wishlist_quickview' AJAX action in all versions up to, and including, 5.0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view other user's wishlist data and information.
Title WPC Smart Wishlist for WooCommerce <= 5.0.4 - Missing Authorization to Authenticated (Subscriber+) Information Exposure
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Wordpress Wordpress
Wpclever Wpc Smart Wishlist For Woocommerce
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:56:40.379Z

Reserved: 2025-10-14T14:04:03.801Z

Link: CVE-2025-11742

cve-icon Vulnrichment

Updated: 2025-10-20T19:00:11.814Z

cve-icon NVD

Status : Deferred

Published: 2025-10-18T06:15:38.537

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11742

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T12:45:17Z

Weaknesses