Vulnerability Description
The TeraWallet – Best WooCommerce Wallet System With Cashback Rewards, Partial Payment, Wallet Refunds plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the terawallet_export_user_search() function in all versions up to, and including, 1.4.10. This makes it possible for authenticated attackers, with subscriber-level access and above, to export a list of registered users and their emails.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Standalonetech | Terawallet | < 1.4.11 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/changeset/3043412/woo-wallet/trunk/includes/cPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/18e24a2e-cbc6-4285-b84Third Party Advisory
- https://plugins.trac.wordpress.org/changeset/3043412/woo-wallet/trunk/includes/cPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/18e24a2e-cbc6-4285-b84Third Party Advisory
FAQ
What is CVE-2024-1690?
CVE-2024-1690 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The TeraWallet – Best WooCommerce Wallet System With Cashback Rewards, Partial Payment, Wallet Refunds plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability che...
How severe is CVE-2024-1690?
CVE-2024-1690 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-1690?
Check the references section above for vendor advisories and patch information. Affected products include: Standalonetech Terawallet.