Arbitrary File Upload Vulnerability in MStore API Plugin
CVE-2024-8242
8.8HIGH
Key Information
- Vendor
- Inspireui
- Status
- Mstore Api – Create Native Android & iOS Apps On The Cloud
- Vendor
- CVE Published:
- 13 September 2024
Summary
The MStore API – Create Native Android & iOS Apps On The Cloud plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the update_user_profile() function in all versions up to, and including, 4.15.3. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files (not including PHP files) on the affected site's server which may make remote code execution possible. This can be paired with a registration endpoint for unauthenticated users to exploit the issue.
Affected Version(s)
MStore API – Create Native Android & iOS Apps On The Cloud <= 4.15.3
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published.
Disclosed
Vulnerability Reserved.
Collectors
NVD DatabaseMitre Database
Credit
Matthew Rollings