Authentication Bypass in MStore API Plugin for WordPress
CVE-2020-36713
9.8CRITICAL
Summary
The MStore API plugin for WordPress, in versions through 2.1.5, contains a vulnerability that allows unauthenticated attackers to bypass authentication controls. This flaw arises from unrestricted access to the 'register' and 'update_user_profile' endpoints, enabling malicious users to create or delete administrator accounts and escalate privileges on existing accounts. Such security issues pose a significant risk to the integrity of WordPress websites using this plugin, making timely updates crucial.
Affected Version(s)
MStore API * < 2.1.6
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Jerome Bruandet