Vulnerabilities and security researches foryith-woocommerce-wishlist yith-woocommerce-wishlist
Direction: ascendingJun 06, 2024
YITH WooCommerce Wishlist # CVE-2024-34385
- CVE, Research URL
- Home page URL
- Application
- Date
- Jun 03, 2024
- Research Description
- Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in YITH YITH WooCommerce Wishlist allows Stored XSS.This issue affects YITH WooCommerce Wishlist: from n/a through 3.32.0.
- Affected versions
-
max 3.33.0.
- Status
-
vulnerable
YITH WooCommerce Wishlist # CVE-2019-16251
- CVE, Research URL
- Home page URL
- Application
- Date
- Oct 31, 2019
- Research Description
- plugin-fw/lib/yit-plugin-panel-wc.php in the YIT Plugin Framework through 3.3.8 for WordPress allows authenticated options changes.
- Affected versions
-
max 2.2.0.
- Status
-
vulnerable
Jun 14, 2025
YITH WooCommerce Wishlist # CVE-2025-5238
- CVE, Research URL
- Home page URL
- Application
- Date
- Jun 14, 2025
- Research Description
- The YITH WooCommerce Wishlist plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘id’ parameter in all versions up to, and including, 4.5.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
max 4.6.0.
- Status
-
vulnerable
Dec 10, 2025
YITH WooCommerce Wishlist # CVE-2025-12427
- CVE, Research URL
- Home page URL
- Application
- Date
- Nov 19, 2025
- Research Description
- The YITH WooCommerce Wishlist plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.10.0 via the REST API endpoint and AJAX handler due to missing validation on user-controlled keys. This makes it possible for unauthenticated attackers to discover any user's wishlist token ID, and subsequently rename the victim's wishlist without authorization (integrity impact). This can be exploited to target multi-user stores for defacement, social engineering attacks, mass tampering, and profiling at scale.
- Affected versions
-
max 4.10.1.
- Status
-
vulnerable
YITH WooCommerce Wishlist # CVE-2025-12777
- CVE, Research URL
- Home page URL
- Application
- Date
- Nov 19, 2025
- Research Description
- The YITH WooCommerce Wishlist plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 4.10.0. This is due to the plugin not properly verifying that a user is authorized to perform actions on the REST API /wp-json/yith/wishlist/v1/lists endpoint (which uses permission_callback => '__return_true') and the AJAX delete_item handler (which only checks nonce validity without verifying object-level authorization). This makes it possible for unauthenticated attackers to disclose wishlist tokens for any user and subsequently delete wishlist items by chaining the REST API authorization bypass with the exposed delete_item nonce on shared wishlist pages and the AJAX handler's missing object-level authorization check.
- Affected versions
-
max 4.10.1.
- Status
-
vulnerable