Lucene search

K
cveWordfenceCVE-2022-3995
HistoryNov 29, 2022 - 9:15 p.m.

CVE-2022-3995

2022-11-2921:15:11
CWE-639
Wordfence
web.nvd.nist.gov
36
4
terawallet
wordpress
plugin
vulnerability
insecure direct object reference
cve-2022-3995
nvd

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

AI Score

4.3

Confidence

High

EPSS

0.001

Percentile

19.5%

The TeraWallet plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 1.4.3. This is due to insufficient validation of the user-controlled key on the lock_unlock_terawallet AJAX action. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to lock/unlock other users wallets.

Affected configurations

Nvd
Vulners
Node
standalonetechterawalletRange1.4.3wordpress
VendorProductVersionCPE
standalonetechterawallet*cpe:2.3:a:standalonetech:terawallet:*:*:*:*:*:wordpress:*:*

CNA Affected

[
  {
    "vendor": "subratamal",
    "product": "TeraWallet – For WooCommerce",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "1.4.3",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

Social References

More

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

AI Score

4.3

Confidence

High

EPSS

0.001

Percentile

19.5%