{"api_version":"1","generated_at":"2026-04-23T15:09:16+00:00","cve":"CVE-2023-3076","urls":{"html":"https://cve.report/CVE-2023-3076","api":"https://cve.report/api/cve/CVE-2023-3076.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-3076","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-3076"},"summary":{"title":"CVE-2023-3076","description":"The MStore API WordPress plugin before 3.9.9 does not prevent visitors from creating user accounts with the role of their choice via their wholesale REST API endpoint. This is only exploitable if the site owner paid to access the plugin's pro features.","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2023-07-10 16:15:00","updated_at":"2023-11-07 04:17:00"},"problem_types":["CWE-862"],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/ac662436-29d7-4ea6-84e1-f9e229b44f5b","name":"https://wpscan.com/vulnerability/ac662436-29d7-4ea6-84e1-f9e229b44f5b","refsource":"MISC","tags":[],"title":"MStore API < 3.9.9 - Unauthenticated Privilege Escalation WordPress Security Vulnerability","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-3076","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3076","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"3076","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"inspireui","cpe5":"mstore_api","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-3076","qid":"731073","title":"WordPress Plugin Mstore-api Unauthenticated Privilege Escalation Vulnerability"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-3076","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"The MStore API WordPress plugin before 3.9.9 does not prevent visitors from creating user accounts with the role of their choice via their wholesale REST API endpoint. This is only exploitable if the site owner paid to access the plugin's pro features."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-862 Missing Authorization"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"MStore API","version":{"version_data":[{"version_affected":"<","version_name":"0","version_value":"3.9.9"}]}}]}}]}},"references":{"reference_data":[{"url":"https://wpscan.com/vulnerability/ac662436-29d7-4ea6-84e1-f9e229b44f5b","refsource":"MISC","name":"https://wpscan.com/vulnerability/ac662436-29d7-4ea6-84e1-f9e229b44f5b"}]},"generator":{"engine":"WPScan CVE Generator"},"source":{"discovery":"EXTERNAL"},"credits":[{"lang":"en","value":"Truoc Phan"},{"lang":"en","value":"WPScan"}]},"nvd":{"publishedDate":"2023-07-10 16:15:00","lastModifiedDate":"2023-11-07 04:17:00","problem_types":["CWE-862"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"3.9.9","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}