QID 731073

Date Published: 2024-01-15

QID 731073: WordPress Plugin Mstore-api Unauthenticated Privilege Escalation Vulnerability

The plugin is used for config the Mstore/FluxStore mobile and support RestAPI to connect to the app.

CVE-2023-3076 : The MStore API plugin for WordPress is vulnerable to Privilege Escalation in versions up to, and including, 3.9.8 due to insufficient restriction on roles supplied during registration through the /register REST route. This allows unauthenticated attackers register as administrators..

Affected Versions:
WordPress MStore API plugin versions prior to 3.9.9

QID Detection Logic:
This unauthenticated detection checks for installed vulnerable version for MStore API Plugin using Blind Elephant Fingerprint technique.

Successful exploitation of this vulnerability may allow remote attackers to log in as any user as long as they know the user's email address.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    Customers are advised to upgrade to WP MStore API version 3.9.9 and later to remediate this vulnerability.
    Vendor References

    CVEs related to QID 731073

    Software Advisories
    Advisory ID Software Component Link
    MStore API URL Logo wordpress.org/plugins/mstore-api/#developers