VYPR
Medium severity5.3NVD Advisory· Published Sep 22, 2025· Updated Apr 23, 2026

CVE-2025-58247

CVE-2025-58247

Description

Missing Authorization vulnerability in templateinvaders TI WooCommerce Wishlist ti-woocommerce-wishlist allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects TI WooCommerce Wishlist: from n/a through <= 2.10.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing authorization in TI WooCommerce Wishlist (≤2.10.0) lets unauthenticated attackers exploit incorrectly configured access controls.

What the

Vulnerability Is

CVE-2025-58247 is a missing authorization vulnerability in the TI WooCommerce Wishlist plugin for WordPress, affecting versions through 2.10.0. The plugin fails to properly enforce access control security levels, allowing exploitation of incorrectly configured access control mechanisms. This means that certain functions or endpoints that should require authentication or specific permissions are left unprotected [1].

How

It Is Exploited

An attacker can exploit this broken access control by sending crafted requests to the vulnerable plugin endpoints without needing any prior authentication. The vulnerability is particularly concerning because it can be used in mass-exploit campaigns, targeting thousands of websites at once regardless of their traffic size or popularity [1]. No special privileges or user interaction are required for exploitation.

Impact

Successful exploitation allows an unauthenticated attacker to perform actions that should be restricted to higher-privileged users, such as modifying wishlist data or accessing protected settings. While the CVSS score (5.3) indicates medium severity, the real-world risk is elevated by the plugin's wide usage and the potential for automated, widespread attacks [1].

Mitigation

Status

The vendor has released version 2.11.0 which fixes the vulnerability. Users are strongly advised to update immediately. For those unable to update, consulting a hosting provider or web developer is recommended. Patchstack users can enable auto-updates for vulnerable plugins only [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.