Description
The YITH WooCommerce Wishlist WordPress plugin before 4.13.0 does not properly validate wishlist ownership in the save_title() AJAX handler before allowing wishlist renaming operations. The function only checks for a valid nonce, which is publicly exposed in the page source of the /wishlist/ page, making it possible for unauthenticated attackers to rename any wishlist belonging to any user on the site.
Published: 2026-04-10
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized modification of user wishlists
Action: Patch Immediately
AI Analysis

Impact

The YITH WooCommerce Wishlist plugin allows an attacker to rename any user's wishlist. The vulnerability stems from inadequate validation of wishlist ownership in the save_title() AJAX handler. Only a nonce is checked, and the nonce is publicly exposed on the /wishlist/ page, enabling unauthenticated users to craft a request that changes a wishlist title. The primary impact is the alteration of user data—wishlist names—without consent, affecting the integrity and confidentiality of the wishlist information.

Affected Systems

Any WordPress site that installs the YITH WooCommerce Wishlist plugin prior to version 4.13.0 is affected. The plugin, developed by YITH, is commonly used for e‑commerce wishlists. No further version details are supplied; therefore, all releases before 4.13.0 should be considered vulnerable.

Risk and Exploitability

The CVSS score of 6.5 designates medium severity, primarily because the flaw is exploitable without authentication. The EPSS score of less than 1% indicates low probability of widespread exploitation, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is simple: an unauthenticated attacker accesses the /wishlist/ page, obtains the public nonce, and sends a crafted AJAX request to rename any wishlist. The impact is limited to the integrity of user wishlists and could obscure user intent or mislead other site visitors. The vulnerability does not grant system compromise or data exfiltration.

Generated by OpenCVE AI on April 13, 2026 at 15:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update YITH WooCommerce Wishlist to version 4.13.0 or later.
  • If an update is unavailable, temporarily disable or restrict the AJAX endpoint that handles wishlist renaming until a patch can be applied.
  • Monitor the site for unexpected wishlist name changes and review access logs for anomalous activity.

Generated by OpenCVE AI on April 13, 2026 at 15:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
CWE-639

Mon, 13 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
CWE-639

Fri, 10 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 10:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
CWE-639

Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Yithemes
Yithemes yith Woocommerce Wishlist
Vendors & Products Wordpress
Wordpress wordpress
Yithemes
Yithemes yith Woocommerce Wishlist

Fri, 10 Apr 2026 06:15:00 +0000

Type Values Removed Values Added
Description The YITH WooCommerce Wishlist WordPress plugin before 4.13.0 does not properly validate wishlist ownership in the save_title() AJAX handler before allowing wishlist renaming operations. The function only checks for a valid nonce, which is publicly exposed in the page source of the /wishlist/ page, making it possible for unauthenticated attackers to rename any wishlist belonging to any user on the site.
Title YITH WooCommerce Wishlist < 4.13.0 - Unauthenticated Arbitrary Wishlist Renaming via IDOR
References

Subscriptions

Wordpress Wordpress
Yithemes Yith Woocommerce Wishlist
cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2026-04-10T18:35:19.917Z

Reserved: 2026-03-19T16:03:07.509Z

Link: CVE-2026-4432

cve-icon Vulnrichment

Updated: 2026-04-10T18:35:15.330Z

cve-icon NVD

Status : Deferred

Published: 2026-04-10T07:16:21.237

Modified: 2026-04-15T15:05:47.827

Link: CVE-2026-4432

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:36:36Z

Weaknesses