Sitemap

Wishlist Logic bug: How I Manipulated Item Quantities Without Access

2 min readJun 29, 2025

--

Hello everyone! I’m Omar Mohamed, also known as 0xnanashi.
In this post, I’ll talk about a Vulnerability I have found that allows me to Manipulate Item Quantities for any Wishlist.

Summary

The Core Vulnerability: Two Flaws, One Exploit

The flaw was a dangerous cocktail of two security issues:

  1. Broken Access Control
    Users could Manipulate any public registry’s item quantities — even with zero ownership or permissions.
  2. Improper Input Validation
    The backend used signed 32-bit integers without validating user input, enabling integer overflow exploits.

Together, these allowed me to hijack any wishlist.

Attack Workflow

I started by creating my own registry with some test items.

Then, I switched to another account and visited that registry as a normal user

From there, I clicked “Mark as Purchased” and intercepted the request

The request included a purchased_quantity parameter, so I thought, why not try adding a massive number

{
"purchased_quantity": 9999999999999999
}

so I got that response

very interesting

So, there’s a limit we can’t bypass — thea maximum value is 2,147,483,647. I entered that number into the purchased_quantity parameter to see what would happen.

Hmm, nothing interesting happened. So I thought, why not try sending the request again?

Oh! The needed item quantity changed from 1 to 3 — and no one should be able to change needed item quantities except the owner of the wishlist.

and also you can follow me on LinkedIn :

https://www.linkedin.com/in/omar-mohamed-006989248/

--

--

No responses yet