CVE-2022-3995

The TeraWallet plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 1.4.3. This is due to insufficient validation of the user-controlled key on the lock_unlock_terawallet AJAX action. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to lock/unlock other users wallets.
Configurations

Configuration 1 (hide)

cpe:2.3:a:standalonetech:terawallet:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:20

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/changeset/2817824/woo-wallet/trunk?contextall=1&old=2816610&old_path=%2Fwoo-wallet%2Ftrunk - Patch, Third Party Advisory () https://plugins.trac.wordpress.org/changeset/2817824/woo-wallet/trunk?contextall=1&old=2816610&old_path=%2Fwoo-wallet%2Ftrunk - Patch, Third Party Advisory
References () https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3995 - Third Party Advisory () https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3995 - Third Party Advisory

Information

Published : 2022-11-29 21:15

Updated : 2024-11-21 07:20


NVD link : CVE-2022-3995

Mitre link : CVE-2022-3995

CVE.ORG link : CVE-2022-3995


JSON object : View

Products Affected

standalonetech

  • terawallet
CWE
CWE-639

Authorization Bypass Through User-Controlled Key