Authentication Bypass in MStore API Plugin for WordPress
CVE-2023-2733
9.8CRITICAL
Summary
The MStore API plugin for WordPress is affected by an authentication bypass vulnerability that allows unauthenticated attackers to gain access to user accounts, including administrator accounts. This flaw stems from a lack of adequate user verification during the coupon redemption REST API requests. Attackers can exploit this vulnerability to log in as any existing user by merely knowing the user ID, putting sensitive information at risk and threatening the overall security of the affected WordPress sites.
Affected Version(s)
MStore API * <= 3.9.0
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Lana Codes