Description
Authorization Bypass Through User-Controlled Key vulnerability in YITH YITH WooCommerce Wishlist allows Exploiting Incorrectly Configured Access Control Security Levels.

This issue affects YITH WooCommerce Wishlist: from n/a through 4.12.0.
Published: 2026-05-07
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an instance of insecure direct object references that permits an attacker to retrieve or manipulate wishlist objects belonging to other users. This exploits improperly configured access control checks and is classified as CWE‑639. An adversary who can identify a valid wishlist identifier can directly access or modify entries they should not have permission to view or edit, potentially exposing personal data and compromising privacy.

Affected Systems

The affected product is the YITH WooCommerce Wishlist plugin for WordPress, impacting all released versions up to and including 4.12.0. The issue is present from the first release through 4.12.0, with no mention of specific product variants. Admins should audit all WordPress sites that host this plugin within that version range.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate impact severity. No EPSS score is available, and the vulnerability is not listed in CISA’s KEV catalog, suggesting that it is not widely exploited yet. The attack vector is inferred to be remote via the web, as the plugin runs within the WordPress environment and accepts user‑controlled identifiers through requests. Successful exploitation would allow read or write access to another user’s wishlist items, potentially leading to privacy breaches or data tampering.

Generated by OpenCVE AI on May 7, 2026 at 09:51 UTC.

Remediation

Vendor Solution

Update the WordPress YITH WooCommerce Wishlist Plugin to the latest available version (at least 4.13.0).


OpenCVE Recommended Actions

  • Update the YITH WooCommerce Wishlist plugin to version 4.13.0 or later
  • Disable or restrict access to the plugin’s public pages for non‑admin users until the patch can be applied
  • If the plugin is critical and cannot be disabled, apply network‑level filtering or firewall rules to limit exposure of the plugin endpoints

Generated by OpenCVE AI on May 7, 2026 at 09:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 08:30:00 +0000

Type Values Removed Values Added
Description Authorization Bypass Through User-Controlled Key vulnerability in YITH YITH WooCommerce Wishlist allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects YITH WooCommerce Wishlist: from n/a through 4.12.0.
Title WordPress YITH WooCommerce Wishlist plugin <= 4.12.0 - Insecure Direct Object References (IDOR) vulnerability
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-05-07T14:16:35.054Z

Reserved: 2026-02-19T09:51:27.898Z

Link: CVE-2026-27329

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-05-07T09:16:27.207

Modified: 2026-05-07T14:00:48.567

Link: CVE-2026-27329

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T10:00:10Z

Weaknesses