Insecure Direct Object Reference vulnerability in TeraWallet WordPress Plugin (up to version 1.4.3) allows unauthorized wallet manipulation

Insecure Direct Object Reference vulnerability in TeraWallet WordPress Plugin (up to version 1.4.3) allows unauthorized wallet manipulation

CVE-2022-3995 · MEDIUM Severity

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

The TeraWallet plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 1.4.3. This is due to insufficient validation of the user-controlled key on the lock_unlock_terawallet AJAX action. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to lock/unlock other users wallets.

Learn more about our Wordpress Pen Testing.