CVE-2022-3995
TeraWallet โ For WooCommerce <= 1.4.3 - Insecure Direct Object Reference
CVSS Score
4.3
EPSS Score
0.0%
EPSS Percentile
0th
The TeraWallet plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 1.4.3. This is due to insufficient validation of the user-controlled key on the lock_unlock_terawallet AJAX action. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to lock/unlock other users wallets.
| CWE | CWE-639 |
| Vendor | subratamal |
| Product | wallet for woocommerce |
| Published | Nov 29, 2022 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for subratamal wallet for woocommerce
Be the first to know when new medium vulnerabilities affecting subratamal wallet for woocommerce are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
subratamal / Wallet for WooCommerce
0 โค 1.4.3
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/ec57e0b2-61b0-4b67-9784-dbb4e6c4e4a6?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/2817824/woo-wallet/trunk?contextall=1&old=2816610&old_path=%2Fwoo-wallet%2Ftrunk wordfence.com: https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3995
Credits
Marco Wotschka