{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-25T07:03:43.650","vulnerabilities":[{"cve":{"id":"CVE-2024-7747","sourceIdentifier":"security@wordfence.com","published":"2024-11-28T13:15:21.843","lastModified":"2025-07-15T16:19:13.603","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The Wallet for WooCommerce plugin for WordPress is vulnerable to incorrect conversion between numeric types in all versions up to, and including, 1.5.6. This is due to a numerical logic flaw when transferring funds to another user. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create funds during a transfer and distribute these funds to any number of other users or their own account, rendering products free. Attackers could also request to withdraw funds if the Wallet Withdrawal extension is used and the request is approved by an administrator."},{"lang":"es","value":"El complemento Wallet for WooCommerce para WordPress es vulnerable a la conversión incorrecta entre tipos numéricos en todas las versiones hasta la 1.5.6 incluida. Esto se debe a una falla en la lógica numérica al transferir fondos a otro usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor o superior, creen fondos durante una transferencia y distribuyan estos fondos a cualquier cantidad de otros usuarios o a su propia cuenta, lo que hace que los productos sean gratuitos. Los atacantes también podrían solicitar retirar fondos si se utiliza la extensión Wallet Withdrawal y la solicitud es aprobada por un administrador."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-681"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:standalonetech:terawallet:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"1.5.7","matchCriteriaId":"C08D590F-3D2E-4533-80EB-B19C834D73E0"}]}]}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/woo-wallet/trunk/includes/class-woo-wallet-frontend.php#L407","source":"security@wordfence.com","tags":["Product"]},{"url":"https://plugins.trac.wordpress.org/changeset/3145131/","source":"security@wordfence.com","tags":["Patch"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/fd8f3eb7-ac60-46c4-b41f-5d89e3133042?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]}]}}]}