QID 731040

Date Published: 2023-12-21

QID 731040: WordPress Plugin Mstore-api Unauthenticated Privilege Escalation Vulnerability

The plugin is used for config the Mstore/FluxStore mobile and support RestAPI to connect to the app.

CVE-2023-3277 : The MStore API plugin for WordPress is vulnerable to Unauthorized Account Access and Privilege Escalation in versions up to, and including, 4.10.7 due to improper implementation of the Apple login feature. This allows unauthenticated attackers to log in as any user as long as they know the user's email address.

Affected Versions:
WordPress food-and-drink-menu plugin versions prior to 4.10.8

QID Detection Logic:
This unauthenticated detection checks for installed vulnerable version for MStore API Plugin using Blind Elephant Fingerprint technique.

Successful exploitation of this vulnerability may allow remote attackers to log in as any user as long as they know the user's email address.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    Customers are advised to upgrade to WP MStore API version 4.10.8 and later to remediate this vulnerability.
    Vendor References

    CVEs related to QID 731040

    Software Advisories
    Advisory ID Software Component Link
    MStore API URL Logo wordpress.org/plugins/mstore-api/#developers