CVE-2024-7747
- EPSS 0.13%
- Veröffentlicht 28.11.2024 13:15:21
- Zuletzt bearbeitet 15.07.2025 16:19:13
The Wallet for WooCommerce plugin for WordPress is vulnerable to incorrect conversion between numeric types in all versions up to, and including, 1.5.6. This is due to a numerical logic flaw when transferring funds to another user. This makes it poss...
CVE-2024-6353
- EPSS 0.59%
- Veröffentlicht 12.07.2024 09:15:02
- Zuletzt bearbeitet 10.07.2025 22:12:23
The Wallet for WooCommerce plugin for WordPress is vulnerable to SQL Injection via the 'search[value]' parameter in all versions up to, and including, 1.5.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparatio...
CVE-2024-32584
- EPSS 0.14%
- Veröffentlicht 18.04.2024 10:15:14
- Zuletzt bearbeitet 05.02.2025 15:04:03
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in StandaloneTech TeraWallet – For WooCommerce allows Stored XSS.This issue affects TeraWallet – For WooCommerce: from n/a through 1.5.0.
CVE-2024-1690
- EPSS 0.21%
- Veröffentlicht 13.03.2024 16:15:26
- Zuletzt bearbeitet 05.02.2025 15:08:02
The TeraWallet – Best WooCommerce Wallet System With Cashback Rewards, Partial Payment, Wallet Refunds plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the terawallet_export_user_search() function...
CVE-2022-40198
- EPSS 0.14%
- Veröffentlicht 01.03.2023 14:15:16
- Zuletzt bearbeitet 21.11.2024 07:21:02
Cross-Site Request Forgery (CSRF) vulnerability in StandaloneTech TeraWallet – For WooCommerce plugin <= 1.3.24 leading to plugin settings change.
CVE-2022-36401
- EPSS 0.1%
- Veröffentlicht 02.02.2023 21:22:36
- Zuletzt bearbeitet 21.11.2024 07:12:56
Cross-Site Request Forgery (CSRF) vulnerability in TeraWallet – For WooCommerce plugin <= 1.3.24 versions.
CVE-2022-3995
- EPSS 0.11%
- Veröffentlicht 29.11.2022 21:15:11
- Zuletzt bearbeitet 21.11.2024 07:20:41
The TeraWallet plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 1.4.3. This is due to insufficient validation of the user-controlled key on the lock_unlock_terawallet AJAX action. This makes it...