CVE-2023-3076

The MStore API WordPress plugin before 3.9.9 does not prevent visitors from creating user accounts with the role of their choice via their wholesale REST API endpoint. This is only exploitable if the site owner paid to access the plugin's pro features.
Configurations

Configuration 1 (hide)

cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 08:16

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/ac662436-29d7-4ea6-84e1-f9e229b44f5b - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/ac662436-29d7-4ea6-84e1-f9e229b44f5b - Exploit, Third Party Advisory

07 Nov 2023, 04:17

Type Values Removed Values Added
CWE CWE-862

17 Jul 2023, 18:22

Type Values Removed Values Added
References (MISC) https://wpscan.com/vulnerability/ac662436-29d7-4ea6-84e1-f9e229b44f5b - (MISC) https://wpscan.com/vulnerability/ac662436-29d7-4ea6-84e1-f9e229b44f5b - Exploit, Third Party Advisory
CPE cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Inspireui mstore Api
Inspireui
CWE CWE-269 CWE-862

10 Jul 2023, 16:27

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-10 16:15

Updated : 2024-11-21 08:16


NVD link : CVE-2023-3076

Mitre link : CVE-2023-3076

CVE.ORG link : CVE-2023-3076


JSON object : View

Products Affected

inspireui

  • mstore_api
CWE
CWE-862

Missing Authorization