Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total4
Critical0
High0
Medium4
Reset
Showing 1-4 of 4 records
Threat Entry Updated 2026-04-15

CVE-2026-4432 - Yith Woocommerce Wishlist Plugin

The YITH WooCommerce Wishlist WordPress plugin before 4.13.0 does not properly validate wishlist ownership in the save_title() AJAX handler before allowing wishlist renaming operations. The function only checks for a valid nonce, which is publicly exposed in the page source of the /wishlist/ page, making it possible for unauthenticated attackers to rename any wishlist belonging to any user on the site.

PLUGIN Yith Woocommerce Wishlist

CVE-2026-4432

MEDIUM CVSS 6.5 2026-04-10
Threat Entry Updated 2025-11-19

CVE-2025-12777 - Yith Woocommerce Wishlist Plugin

The YITH WooCommerce Wishlist plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 4.10.0. This is due to the plugin not properly verifying that a user is authorized to perform actions on the REST API /wp-json/yith/wishlist/v1/lists endpoint (which uses permission_callback => '__return_true') and the AJAX delete_item handler (which only checks nonce validity without verifying object-level authorization). This makes it possible for unauthenticated attackers to disclose wishlist tokens for any user and subsequently delete wishlist items by chaining the REST API authorization bypass with the…

PLUGIN Yith Woocommerce Wishlist

CVE-2025-12777

MEDIUM CVSS 5.3 2025-11-19
Threat Entry Updated 2025-11-19

CVE-2025-12427 - Yith Woocommerce Wishlist Plugin

The YITH WooCommerce Wishlist plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.10.0 via the REST API endpoint and AJAX handler due to missing validation on user-controlled keys. This makes it possible for unauthenticated attackers to discover any user's wishlist token ID, and subsequently rename the victim's wishlist without authorization (integrity impact). This can be exploited to target multi-user stores for defacement, social engineering attacks, mass tampering, and profiling at scale.

PLUGIN Yith Woocommerce Wishlist

CVE-2025-12427

MEDIUM CVSS 5.3 2025-11-19
Threat Entry Updated 2025-06-16

CVE-2025-5238 - Yith Woocommerce Wishlist Plugin

The YITH WooCommerce Wishlist plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘id’ parameter in all versions up to, and including, 4.5.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Yith Woocommerce Wishlist

CVE-2025-5238

MEDIUM CVSS 6.4 2025-06-14
Scroll to top