The TeraWallet plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 1.4.3. This is due to insufficient validation of the user-controlled key on the lock_unlock_terawallet AJAX action. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to lock/unlock other users wallets.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/changeset/2817824/woo-wallet/trunk?contextall=1&old=2816610&old_path=%2Fwoo-wallet%2Ftrunk | Patch Third Party Advisory |
https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3995 | Third Party Advisory |
Configurations
Information
Published : 2022-11-29 13:15
Updated : 2022-12-01 11:56
NVD link : CVE-2022-3995
Mitre link : CVE-2022-3995
JSON object : View
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
Products Affected
standalonetech
- terawallet