Description
The YITH WooCommerce Wishlist plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘id’ parameter in all versions up to, and including, 4.5.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-06-14
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross-Site Scripting
Action: Patch
AI Analysis

Impact

The vulnerability involves stored cross‑site scripting that arises from insufficient input sanitization and output escaping of the 'id' parameter in YITH WooCommerce Wishlist. Only authenticated users with Contributor-level or higher privileges can inject malicious scripts via that parameter, and those scripts will be rendered and executed in the browsers of any visitor accessing the affected pages. The execution of the injected code can alter page content and potentially expose the visitors' session or other sensitive data, but the CVE documentation does not explicitly state specific downstream impacts such as data theft or session hijacking.

Affected Systems

This flaw affects all releases of the YITH WooCommerce Wishlist WordPress plugin up to and including version 4.5.0, distributed by yithemes under the product name YITH WooCommerce Wishlist. WordPress sites that have imported or otherwise used the 'id' parameter within the plugin in the 4.5.0 or earlier releases are potentially impacted. The vendor documented the issue in the change log for the free version and referenced the affected source file https://plugins.svn.wordpress.org/yith-woocommerce-wishlist/tags/4.5.0/assets/js/unminified/jquery.yith-wcwl.js.

Risk and Exploitability

The CVSS score of 6.4 assigns moderate severity to the flaw. The EPSS value of less than 1% indicates a low probability of observed exploitation. The issue is not listed in the CISA KEV catalog. Attackers must first authenticate to the WordPress site as a contributor or higher, then supply a malicious payload via the vulnerable id parameter; the payload will be stored and rendered on subsequent visits by any user, which could lead to cross‑site scripting attacks.

Generated by OpenCVE AI on April 22, 2026 at 01:19 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the YITH WooCommerce Wishlist plugin to any version newer than 4.5.0, which contains the fix for the stored XSS vulnerability.
  • If an upgrade cannot be performed immediately, temporarily deny contributor or higher-level users the ability to use the wishlist functionality until the vulnerability is patched.
  • Configure the site’s web‑application firewall or security plugin to block or sanitize attempts to inject JavaScript via the id parameter of the wishlist feature.

Generated by OpenCVE AI on April 22, 2026 at 01:19 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-18337 The YITH WooCommerce Wishlist plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘id’ parameter in all versions up to, and including, 4.5.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Fri, 10 Apr 2026 04:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00036}

epss

{'score': 0.00042}


Sat, 14 Jun 2025 09:30:00 +0000

Type Values Removed Values Added
Description The YITH WooCommerce Wishlist plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘id’ parameter in all versions up to, and including, 4.5.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title YITH WooCommerce Wishlist <= 4.5.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via id Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:59:24.712Z

Reserved: 2025-05-26T22:21:50.209Z

Link: CVE-2025-5238

cve-icon Vulnrichment

Updated: 2025-06-16T16:47:05.160Z

cve-icon NVD

Status : Deferred

Published: 2025-06-14T10:15:19.987

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-5238

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T01:30:05Z

Weaknesses