Description
The YITH WooCommerce Wishlist WordPress plugin before 4.13.0 does not properly validate wishlist ownership in the save_title() AJAX handler before allowing wishlist renaming operations. The function only checks for a valid nonce, which is publicly exposed in the page source of the /wishlist/ page, making it possible for unauthenticated attackers to rename any wishlist belonging to any user on the site.
Published: 2026-04-10
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated IDOR allowing wishlist renaming
Action: Patch Now
AI Analysis

Impact

The YITH WooCommerce Wishlist plugin for WordPress contains a flaw that allows an attacker to rename any user's wishlist without authentication. The AJAX endpoint save_title validates only a nonce that is embedded in the page source of the public /wishlist/ page, so an unauthenticated user can obtain the nonce, send a request, and change the title of any wishlist. This compromises data integrity, can mislead users, and facilitates social engineering or brand confusion. The weakness is an Insecure Direct Object Reference.

Affected Systems

Any WordPress site that has the YITH WooCommerce Wishlist plugin installed and running a version earlier than 4.13.0 is affected. The vulnerability resides in the plugin itself and does not depend on specific versions of WordPress core or other plugins, so the impact applies to all installations of the affected plugin release.

Risk and Exploitability

Because no authentication is required and the required nonce is publicly retrievable, the attack path is straightforward. While no CVSS score is provided in the CVE data, the inherent privilege escalation and potential for user confusion suggest high impact. The EPSS score is unavailable and the vulnerability is not listed in CISA’s KEV catalog; however the lack of mitigation and clear exploitation steps increase the likelihood that servers will be targeted once the exploit is discovered.

Generated by OpenCVE AI on April 10, 2026 at 07:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update YITH WooCommerce Wishlist to version 4.13.0 or later
  • Verify that any previously named wishlists have not been altered unexpectedly
  • Monitor user wishlist changes for unexpected activity

Generated by OpenCVE AI on April 10, 2026 at 07:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 10:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
CWE-639

Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Yithemes
Yithemes yith Woocommerce Wishlist
Vendors & Products Wordpress
Wordpress wordpress
Yithemes
Yithemes yith Woocommerce Wishlist

Fri, 10 Apr 2026 06:15:00 +0000

Type Values Removed Values Added
Description The YITH WooCommerce Wishlist WordPress plugin before 4.13.0 does not properly validate wishlist ownership in the save_title() AJAX handler before allowing wishlist renaming operations. The function only checks for a valid nonce, which is publicly exposed in the page source of the /wishlist/ page, making it possible for unauthenticated attackers to rename any wishlist belonging to any user on the site.
Title YITH WooCommerce Wishlist < 4.13.0 - Unauthenticated Arbitrary Wishlist Renaming via IDOR
References

Subscriptions

Wordpress Wordpress
Yithemes Yith Woocommerce Wishlist
cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2026-04-10T18:35:19.917Z

Reserved: 2026-03-19T16:03:07.509Z

Link: CVE-2026-4432

cve-icon Vulnrichment

Updated: 2026-04-10T18:35:15.330Z

cve-icon NVD

Status : Received

Published: 2026-04-10T07:16:21.237

Modified: 2026-04-10T19:16:26.943

Link: CVE-2026-4432

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:26:36Z

Weaknesses