Authentication Bypass in MStore API Plugin for WordPress
CVE-2020-36713

9.8CRITICAL

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
7 June 2023

Summary

The MStore API plugin for WordPress, in versions through 2.1.5, contains a vulnerability that allows unauthenticated attackers to bypass authentication controls. This flaw arises from unrestricted access to the 'register' and 'update_user_profile' endpoints, enabling malicious users to create or delete administrator accounts and escalate privileges on existing accounts. Such security issues pose a significant risk to the integrity of WordPress websites using this plugin, making timely updates crucial.

Affected Version(s)

MStore API * < 2.1.6

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Jerome Bruandet
.
🍪 This website uses cookies, like every other website on the internet 😕 By using our website, you consent to the use of cookies.