Lucene search

K
nvd[email protected]NVD:CVE-2022-3995
HistoryNov 29, 2022 - 9:15 p.m.

CVE-2022-3995

2022-11-2921:15:11
CWE-639
web.nvd.nist.gov
5
terawallet
wordpress
insecure direct object reference
ajax action
authenticated attackers
subscriber-level permissions

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

EPSS

0.001

Percentile

19.5%

The TeraWallet plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 1.4.3. This is due to insufficient validation of the user-controlled key on the lock_unlock_terawallet AJAX action. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to lock/unlock other users wallets.

Affected configurations

Nvd
Node
standalonetechterawalletRange1.4.3wordpress
VendorProductVersionCPE
standalonetechterawallet*cpe:2.3:a:standalonetech:terawallet:*:*:*:*:*:wordpress:*:*

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

EPSS

0.001

Percentile

19.5%

Related for NVD:CVE-2022-3995