Impact
The YITH WooCommerce Wishlist plugin for WordPress is vulnerable to an Insecure Direct Object Reference, allowing attackers to discover wishlist token IDs through the REST API and AJAX handler without authentication. This vulnerability, classified as CWE‑639, permits unauthenticated users to rename any user’s wishlist, compromising data integrity and enabling defacement, social engineering, and large‑scale profiling attacks.
Affected Systems
The vendor is YITH WooCommerce Wishlist from YIThemes. All releases up to and including version 4.10.0 are affected.
Risk and Exploitability
The vulnerability carries a CVSS base score of 5.3 and an EPSS score of less than 1%, indicating a moderate severity but a low probability of exploitation as of the last assessment. It is not included in the CISA KEV catalog. Attackers can exploit the flaw by accessing the exposed REST endpoint or AJAX route, identifying a wishlist token, and issuing a rename request. Because no authentication is required, the attack can be performed over the public network, but the need to discover valid tokens may reduce practicality.
OpenCVE Enrichment