CVE-2023-3077

The MStore API WordPress plugin before 3.9.8 does not sanitise and escape a parameter before using it in a SQL statement, leading to a Blind SQL injection exploitable by unauthenticated users. This is only exploitable if the site owner elected to pay to get access to the plugins' pro features, and uses the woocommerce-appointments plugin.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:*

History

07 Nov 2023, 04:17

Type Values Removed Values Added
CWE CWE-89

17 Jul 2023, 18:25

Type Values Removed Values Added
CPE cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Inspireui
Inspireui mstore Api
References (MISC) https://wpscan.com/vulnerability/9480d0b5-97da-467d-98f6-71a32599a432 - (MISC) https://wpscan.com/vulnerability/9480d0b5-97da-467d-98f6-71a32599a432 - Exploit, Third Party Advisory

10 Jul 2023, 16:27

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-10 16:15

Updated : 2024-02-28 20:13


NVD link : CVE-2023-3077

Mitre link : CVE-2023-3077

CVE.ORG link : CVE-2023-3077


JSON object : View

Products Affected

inspireui

  • mstore_api
CWE

No CWE.