The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.1.5. This is due to unrestricted access to the 'register' and 'update_user_profile' routes. This makes it possible for unauthenticated attackers to create new administrator accounts, delete existing administrator accounts, or escalate privileges on any account.
References
Configurations
History
21 Nov 2024, 05:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.nintechnet.com/critical-vulnerability-fixed-in-wordpress-mstore-api-plugin/ - Exploit | |
References | () https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-mstore-api-security-bypass-2-1-5/ - Third Party Advisory | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/934c3ce9-cf2d-4bf6-9a34-f448cb2e5a1d?source=cve - Third Party Advisory |
Information
Published : 2023-06-07 02:15
Updated : 2024-11-21 05:30
NVD link : CVE-2020-36713
Mitre link : CVE-2020-36713
CVE.ORG link : CVE-2020-36713
JSON object : View
Products Affected
inspireui
- mstore_api
CWE
CWE-306
Missing Authentication for Critical Function