Lucene search

K
cveWordfenceCVE-2023-2734
HistoryMay 25, 2023 - 3:15 a.m.

CVE-2023-2734

2023-05-2503:15:08
Wordfence
web.nvd.nist.gov
38
mstore api
wordpress
authentication bypass
vulnerability
plugin
nvd
cve-2023-2734

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.002

Percentile

55.9%

The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.9.1. This is due to insufficient verification on the user being supplied during the cart sync from mobile REST API request through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id.

Affected configurations

Nvd
Vulners
Node
inspireuimstore_apiRange≀3.9.1wordpress
VendorProductVersionCPE
inspireuimstore_api*cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:*

CNA Affected

[
  {
    "vendor": "inspireui",
    "product": "MStore API",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "3.9.1",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.002

Percentile

55.9%