Description
The TI WooCommerce Wishlist plugin for WordPress is vulnerable to HTML Injection in all versions up to, and including, 2.10.0. This is due to the plugin accepting hidden fields and not limiting the values or data that can input and is later output. This makes it possible for unauthenticated attackers to inject arbitrary HTML into wishlist items.
Published: 2025-12-13
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized HTML injection leading to cross‑site scripting
Action: Patch
AI Analysis

Impact

The TI WooCommerce Wishlist plugin for WordPress contains an input‑validation flaw that allows attackers to inject arbitrary HTML into wishlist items. The plugin accepts hidden fields without restricting their content or performing proper filtering before output. This flaw does not require authentication; any user who can submit data to the wishlist can craft malicious payloads. The vulnerability can lead to client‑side code execution, credential theft, or defacement, impacting confidentiality, integrity and availability of the site’s front end.

Affected Systems

The issue affects the TemplateInvaders TI WooCommerce Wishlist plugin for WordPress, versions 2.10.0 and earlier. Users deploying these editions on any WordPress installation are at risk. No other products are mentioned.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity vulnerability. The EPSS score of less than 1% suggests a low exploitation probability in the current threat landscape, and the vulnerability is not listed in CISA’s KEV catalog. Because the attack can be launched without authentication, an adversary could target any public site using the affected plugin. However, successful exploitation requires the injection of attacker‑controlled HTML into a visible page, which may be constrained by site‑level restrictions or client‑side filtering. The primary risk is cross‑site scripting rather than remote code execution.

Generated by OpenCVE AI on April 21, 2026 at 00:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the TI WooCommerce Wishlist plugin to a version newer than 2.10.0 to remove the unauthenticated HTML injection flaw.
  • If a timely upgrade is not possible, configure the plugin or surrounding code to validate and sanitize all hidden fields and block untrusted HTML before rendering the wishlist page.
  • Deploy a Web Application Firewall or a dedicated security plugin that filters out disallowed HTML elements from user‑supplied content on WordPress sites.

Generated by OpenCVE AI on April 21, 2026 at 00:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 15 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Templateinvaders
Templateinvaders ti Woocommerce Wishlist
Wordpress
Wordpress wordpress
Vendors & Products Templateinvaders
Templateinvaders ti Woocommerce Wishlist
Wordpress
Wordpress wordpress

Sat, 13 Dec 2025 07:30:00 +0000

Type Values Removed Values Added
Description The TI WooCommerce Wishlist plugin for WordPress is vulnerable to HTML Injection in all versions up to, and including, 2.10.0. This is due to the plugin accepting hidden fields and not limiting the values or data that can input and is later output. This makes it possible for unauthenticated attackers to inject arbitrary HTML into wishlist items.
Title TI WooCommerce Wishlist <= 2.10.0 - Unauthenticated HTML Injection
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Templateinvaders Ti Woocommerce Wishlist
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:06:08.508Z

Reserved: 2025-08-19T18:35:49.896Z

Link: CVE-2025-9207

cve-icon Vulnrichment

Updated: 2025-12-15T15:24:50.897Z

cve-icon NVD

Status : Deferred

Published: 2025-12-13T16:16:56.850

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-9207

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T01:00:12Z

Weaknesses