CVE-2022-3995

The TeraWallet plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 1.4.3. This is due to insufficient validation of the user-controlled key on the lock_unlock_terawallet AJAX action. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to lock/unlock other users wallets.
Configurations

Configuration 1 (hide)

cpe:2.3:a:standalonetech:terawallet:*:*:*:*:*:wordpress:*:*

History

01 Dec 2022, 19:56

Type Values Removed Values Added
References (MISC) https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3995 - (MISC) https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3995 - Third Party Advisory
References (MISC) https://plugins.trac.wordpress.org/changeset/2817824/woo-wallet/trunk?contextall=1&old=2816610&old_path=%2Fwoo-wallet%2Ftrunk - (MISC) https://plugins.trac.wordpress.org/changeset/2817824/woo-wallet/trunk?contextall=1&old=2816610&old_path=%2Fwoo-wallet%2Ftrunk - Patch, Third Party Advisory
CWE CWE-639
CPE cpe:2.3:a:standalonetech:terawallet:*:*:*:*:*:wordpress:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3

29 Nov 2022, 21:22

Type Values Removed Values Added
New CVE

Information

Published : 2022-11-29 21:15

Updated : 2024-02-04 23:14


NVD link : CVE-2022-3995

Mitre link : CVE-2022-3995

CVE.ORG link : CVE-2022-3995


JSON object : View

Products Affected

standalonetech

  • terawallet
CWE
CWE-639

Authorization Bypass Through User-Controlled Key