The TeraWallet plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 1.4.3. This is due to insufficient validation of the user-controlled key on the lock_unlock_terawallet AJAX action. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to lock/unlock other users wallets.
History

Thu, 23 Jan 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-01-23T20:49:07.448Z

Reserved: 2022-11-14T20:10:25.541Z

Link: CVE-2022-3995

cve-icon Vulnrichment

Updated: 2024-08-03T01:27:53.862Z

cve-icon NVD

Status : Modified

Published: 2022-11-29T21:15:11.597

Modified: 2024-11-21T07:20:41.877

Link: CVE-2022-3995

cve-icon Redhat

No data.