Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 14 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 CWE-639 |
Mon, 13 Apr 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 CWE-639 |
Fri, 10 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 10 Apr 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 CWE-639 |
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress Yithemes Yithemes yith Woocommerce Wishlist |
|
| Vendors & Products |
Wordpress
Wordpress wordpress Yithemes Yithemes yith Woocommerce Wishlist |
Fri, 10 Apr 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The YITH WooCommerce Wishlist WordPress plugin before 4.13.0 does not properly validate wishlist ownership in the save_title() AJAX handler before allowing wishlist renaming operations. The function only checks for a valid nonce, which is publicly exposed in the page source of the /wishlist/ page, making it possible for unauthenticated attackers to rename any wishlist belonging to any user on the site. | |
| Title | YITH WooCommerce Wishlist < 4.13.0 - Unauthenticated Arbitrary Wishlist Renaming via IDOR | |
| References |
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2026-04-10T18:35:19.917Z
Reserved: 2026-03-19T16:03:07.509Z
Link: CVE-2026-4432
Updated: 2026-04-10T18:35:15.330Z
Status : Deferred
Published: 2026-04-10T07:16:21.237
Modified: 2026-04-15T15:05:47.827
Link: CVE-2026-4432
No data.
OpenCVE Enrichment
Updated: 2026-04-14T16:36:36Z