Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 26 Nov 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Themehunk
Themehunk wishlist For Woocommerce Woocommerce Woocommerce woocommerce Wordpress Wordpress wordpress |
|
| Vendors & Products |
Themehunk
Themehunk wishlist For Woocommerce Woocommerce Woocommerce woocommerce Wordpress Wordpress wordpress |
Tue, 25 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 25 Nov 2025 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Wishlist for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.0.9 via several functions in class-th-wishlist-frontend.php due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to modify other user's wishlists | |
| Title | Wishlist for WooCommerce <= 1.0.9 - Insecure Direct Object Reference to Unauthenticated Wishlist Manipulation | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-11-25T15:04:40.396Z
Reserved: 2025-10-21T18:35:46.401Z
Link: CVE-2025-12040
Updated: 2025-11-25T15:04:37.451Z
Status : Awaiting Analysis
Published: 2025-11-25T08:15:47.933
Modified: 2025-11-25T22:16:16.690
Link: CVE-2025-12040
No data.
OpenCVE Enrichment
Updated: 2025-11-26T11:11:05Z