CVE-2025-68024
Description
Missing Authorization vulnerability in Addonify Addonify – WooCommerce Wishlist addonify-wishlist allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Addonify – WooCommerce Wishlist: from n/a through <= 2.0.15.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Missing Authorization vulnerability in Addonify – WooCommerce Wishlist plugin allows unauthenticated attackers to change plugin settings.
The Addonify – WooCommerce Wishlist plugin for WordPress versions up to and including 2.0.15 contains a Missing Authorization vulnerability. This flaw allows attackers to exploit incorrectly configured access control security levels, enabling unauthorized modification of plugin settings without proper authentication [1].
The vulnerability can be exploited by unauthenticated attackers who send crafted requests to the affected plugin's endpoints. No special privileges or user interaction are required, making it accessible to anyone with network access to the WordPress site [1].
Successful exploitation allows an attacker to change the plugin's configuration settings. This could lead to disruption of the wishlist functionality, potential data exposure, or further compromise of the site depending on the settings that can be altered [1].
The vulnerability is patched in version 2.0.16 of the plugin. Users are strongly advised to update immediately. For those unable to update, Patchstack provides a mitigation rule to block attacks until the update can be applied [1]. This vulnerability is considered moderately dangerous and is expected to be used in mass-exploit campaigns [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <= 2.0.15
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.