Browse all 4 CVE security advisories affecting subratamal. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Subratamal develops web applications and APIs primarily for business process automation, with a core use case in enterprise workflow management. Historically, vulnerabilities associated with this developer include remote code execution, cross-site scripting (XSS), and privilege escalation flaws, often stemming from insufficient input validation and improper access controls. While no major public security incidents have been documented, the consistent presence of multiple CVEs indicates ongoing security challenges in secure coding practices. The vulnerabilities typically affect authentication mechanisms and data handling components, suggesting areas requiring improved security testing and input sanitization protocols.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-7747 | Wallet for WooCommerce <= 1.5.6 - Authenticated (Subscriber+) Incorrect Conversion between Numeric Types — Wallet for WooCommerceCWE-681 | 6.5 | Medium | 2024-11-28 |
| CVE-2024-6353 | Wallet for WooCommerce <= 1.5.4 - Authenticated (Subscriber+) SQL Injection via 'search[value]' — Wallet for WooCommerceCWE-89 | 8.8 | High | 2024-07-12 |
| CVE-2024-1690 | TeraWallet – Best WooCommerce Wallet System With Cashback Rewards, Partial Payment, Wallet Refunds <= 1.4.10 - Missing Authorization to Authenticated (Subscriber+) User Email Export — Wallet for WooCommerceCWE-862 | 4.3 | Medium | 2024-03-13 |
| CVE-2022-3995 | TeraWallet – For WooCommerce <= 1.4.3 - Insecure Direct Object Reference — Wallet for WooCommerceCWE-639 | 4.3 | Medium | 2022-11-29 |
This page lists every published CVE security advisory associated with subratamal. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.