Arbitrary File Upload Vulnerability in MStore API Plugin

CVE-2024-8242
8.8HIGH

Key Information

Vendor
Inspireui
Status
Mstore Api – Create Native Android & iOS Apps On The Cloud
Vendor
CVE Published:
13 September 2024

Summary

The MStore API – Create Native Android & iOS Apps On The Cloud plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the update_user_profile() function in all versions up to, and including, 4.15.3. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files (not including PHP files) on the affected site's server which may make remote code execution possible. This can be paired with a registration endpoint for unauthenticated users to exploit the issue.

Affected Version(s)

MStore API – Create Native Android & iOS Apps On The Cloud <= 4.15.3

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published.

  • Disclosed

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database

Credit

Matthew Rollings
.