YITH WooCommerce Wishlist

YITH WooCommerce Wishlist, the most popular wishlist plugin with over 900,000 active installations, has released a new 3.0 version with improved design and added features. The plugin allows users to save their favourite products, share wishlists with friends and family, and indirectly advertise the store on social media. Basic features include selecting a wishlist page and customising columns, while premium features include multi-wishlist support and email notifications. The plugin aims to loyalise customers, push them to buy and attract new customers.

This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Vulnerabilities

  • Input validation vulnerability in YITH WooCommerce Wishlist 4.5.0

    Fixed

    The YITH WooCommerce Wishlist plugin for WordPress has a security issue that allows attackers to inject harmful scripts into web pages. This can happen because the plugin does not properly clean and ...

    Read More
  • Input validation vulnerability in YITH WooCommerce Wishlist 3.32.0

    Fixed

    The YITH WooCommerce Wishlist plugin for WordPress has a security vulnerability that allows hackers to insert harmful code into certain pages. This can happen if the website has a certain setting ena...

    Read More
  • Input validation vulnerability in YITH WooCommerce Wishlist 2.1.2

    Fixed

    The YITH WooCommerce Wishlist plugin for WordPress is vulnerable to a security issue called SQL Injection. This security issue affects versions up to, and including, 2.1.2 of the plugin. It allows at...

    Read More
  • Input validation vulnerability in 45 YITHEMES plugins

    Fixed

    Read More
  • Access violation vulnerability in 38 YITH WooCommerce plugins

    Fixed

    Various plugins created by YITH WooCommerce

    Read More
  • Access violation vulnerability in 45 YITHEMES plugins

    Fixed

    Several plugins made by YITHEMES that can be used with WordPress are vulnerable to authorization bypass. Without the proper security check on the create_log_file function, an attacker who is logged i...

    Read More