CVE-2025-32272

4.3 MEDIUM

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in the PickPlugins Wishlist WordPress plugin allows attackers to trick authenticated users into performing unintended actions. This affects WordPress sites using Wishlist plugin versions up to 1.0.44. Attackers could manipulate wishlist operations when users visit malicious pages while logged in.

💻 Affected Systems

Products:
  • PickPlugins Wishlist WordPress Plugin
Versions: n/a through 1.0.44
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Wishlist plugin enabled and users with wishlist access.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could add/remove items from user wishlists, manipulate wishlist settings, or potentially chain with other vulnerabilities for more severe impact.

🟠

Likely Case

Unauthorized modification of user wishlists, potentially affecting e-commerce functionality and user experience.

🟢

If Mitigated

Minimal impact with proper CSRF protections and user awareness about suspicious links.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks typically require user interaction (visiting malicious page while authenticated).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.45 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/wishlist/vulnerability/wordpress-wishlist-plugin-1-0-41-cross-site-request-forgery-csrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Wishlist' plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download version 1.0.45+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the Wishlist plugin until patched

wp plugin deactivate wishlist

CSRF Protection Middleware

all

Implement additional CSRF protection at application level

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers
  • Educate users about not clicking suspicious links while logged in

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Wishlist version number

Check Version:

wp plugin get wishlist --field=version

Verify Fix Applied:

Verify plugin version is 1.0.45 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual wishlist modification patterns
  • CSRF token validation failures

Network Indicators:

  • Requests to wishlist endpoints without proper referrer headers

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" OR uri_path CONTAINS "wishlist") AND referrer NOT CONTAINS own_domain

🔗 References

📤 Share & Export