{"api_version":"1","generated_at":"2026-04-23T15:10:16+00:00","cve":"CVE-2021-24148","urls":{"html":"https://cve.report/CVE-2021-24148","api":"https://cve.report/api/cve/CVE-2021-24148.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-24148","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-24148"},"summary":{"title":"CVE-2021-24148","description":"A business logic issue in the MStore API WordPress plugin, versions before 3.2.0, had an authentication bypass with Sign In With Apple allowing unauthenticated users to recover an authentication cookie with only an email address.","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2021-03-18 15:15:00","updated_at":"2021-03-23 18:15:00"},"problem_types":["CWE-287"],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/bf5ddc43-974d-41fa-8276-c1a27d3cc882","name":"N/A","refsource":"CONFIRM","tags":[],"title":"MStore API < 3.2.0 - Authentication Bypass With Sign In With Apple Security Vulnerability","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-24148","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-24148","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Vincent Datrier","lang":""}],"nvd_cpes":[{"cve_year":"2021","cve_id":"24148","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"inspireui","cpe5":"mstore_api","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2021-24148","STATE":"PUBLIC","TITLE":"MStore API < 3.2.0 - Authentication Bypass With Sign In With Apple"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"MStore API","version":{"version_data":[{"version_affected":"<","version_name":"3.2.0","version_value":"3.2.0"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"Vincent Datrier"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A business logic issue in the MStore API WordPress plugin, versions before 3.2.0, had an authentication bypass with Sign In With Apple allowing unauthenticated users to recover an authentication cookie with only an email address."}]},"generator":{"engine":"Vulnogram 0.0.9"},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-287 Improper Authentication"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://wpscan.com/vulnerability/bf5ddc43-974d-41fa-8276-c1a27d3cc882","name":"https://wpscan.com/vulnerability/bf5ddc43-974d-41fa-8276-c1a27d3cc882"}]},"source":{"discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2021-03-18 15:15:00","lastModifiedDate":"2021-03-23 18:15:00","problem_types":["CWE-287"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":10},"severity":"HIGH","exploitabilityScore":10,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"3.2.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"24148","Ordinal":"198910","Title":"CVE-2021-24148","CVE":"CVE-2021-24148","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"24148","Ordinal":"1","NoteData":"A business logic issue in the MStore API WordPress plugin, versions before 3.2.0, had an authentication bypass with Sign In With Apple allowing unauthenticated users to recover an authentication cookie with only an email address.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"24148","Ordinal":"2","NoteData":"2021-03-18","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"24148","Ordinal":"3","NoteData":"2021-03-18","Type":"Other","Title":"Modified"}]}}}