CVE-2020-36713

The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.1.5. This is due to unrestricted access to the 'register' and 'update_user_profile' routes. This makes it possible for unauthenticated attackers to create new administrator accounts, delete existing administrator accounts, or escalate privileges on any account.
Configurations

Configuration 1 (hide)

cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:30

Type Values Removed Values Added
References () https://blog.nintechnet.com/critical-vulnerability-fixed-in-wordpress-mstore-api-plugin/ - Exploit () https://blog.nintechnet.com/critical-vulnerability-fixed-in-wordpress-mstore-api-plugin/ - Exploit
References () https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-mstore-api-security-bypass-2-1-5/ - Third Party Advisory () https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-mstore-api-security-bypass-2-1-5/ - Third Party Advisory
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/934c3ce9-cf2d-4bf6-9a34-f448cb2e5a1d?source=cve - Third Party Advisory () https://www.wordfence.com/threat-intel/vulnerabilities/id/934c3ce9-cf2d-4bf6-9a34-f448cb2e5a1d?source=cve - Third Party Advisory

12 Jun 2023, 19:27

Type Values Removed Values Added
CPE cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:*
CWE CWE-306
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/934c3ce9-cf2d-4bf6-9a34-f448cb2e5a1d?source=cve - (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/934c3ce9-cf2d-4bf6-9a34-f448cb2e5a1d?source=cve - Third Party Advisory
References (MISC) https://blog.nintechnet.com/critical-vulnerability-fixed-in-wordpress-mstore-api-plugin/ - (MISC) https://blog.nintechnet.com/critical-vulnerability-fixed-in-wordpress-mstore-api-plugin/ - Exploit
References (MISC) https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-mstore-api-security-bypass-2-1-5/ - (MISC) https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-mstore-api-security-bypass-2-1-5/ - Third Party Advisory
First Time Inspireui mstore Api
Inspireui

07 Jun 2023, 02:45

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-07 02:15

Updated : 2024-11-21 05:30


NVD link : CVE-2020-36713

Mitre link : CVE-2020-36713

CVE.ORG link : CVE-2020-36713


JSON object : View

Products Affected

inspireui

  • mstore_api
CWE
CWE-306

Missing Authentication for Critical Function