Medium severity4.3NVD Advisory· Published Nov 29, 2022· Updated Apr 8, 2026
CVE-2022-3995
CVE-2022-3995
Description
The TeraWallet plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 1.4.3. This is due to insufficient validation of the user-controlled key on the lock_unlock_terawallet AJAX action. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to lock/unlock other users wallets.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- plugins.trac.wordpress.org/changeset/2817824/woo-wallet/trunknvdPatchThird Party Advisory
- www.wordfence.com/vulnerability-advisories-continued/nvdThird Party Advisory
- www.wordfence.com/threat-intel/vulnerabilities/id/ec57e0b2-61b0-4b67-9784-dbb4e6c4e4a6nvd
News mentions
0No linked articles in our index yet.