The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.1.5. This is due to unrestricted access to the 'register' and 'update_user_profile' routes. This makes it possible for unauthenticated attackers to create new administrator accounts, delete existing administrator accounts, or escalate privileges on any account.
References
Configurations
History
21 Nov 2024, 05:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.nintechnet.com/critical-vulnerability-fixed-in-wordpress-mstore-api-plugin/ - Exploit | |
References | () https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-mstore-api-security-bypass-2-1-5/ - Third Party Advisory | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/934c3ce9-cf2d-4bf6-9a34-f448cb2e5a1d?source=cve - Third Party Advisory |
12 Jun 2023, 19:27
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:* | |
CWE | CWE-306 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/934c3ce9-cf2d-4bf6-9a34-f448cb2e5a1d?source=cve - Third Party Advisory | |
References | (MISC) https://blog.nintechnet.com/critical-vulnerability-fixed-in-wordpress-mstore-api-plugin/ - Exploit | |
References | (MISC) https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-mstore-api-security-bypass-2-1-5/ - Third Party Advisory | |
First Time |
Inspireui mstore Api
Inspireui |
07 Jun 2023, 02:45
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-07 02:15
Updated : 2024-11-21 05:30
NVD link : CVE-2020-36713
Mitre link : CVE-2020-36713
CVE.ORG link : CVE-2020-36713
JSON object : View
Products Affected
inspireui
- mstore_api
CWE
CWE-306
Missing Authentication for Critical Function