CVE-2023-3277

The MStore API plugin for WordPress is vulnerable to Unauthorized Account Access and Privilege Escalation in versions up to, and including, 4.10.7 due to improper implementation of the Apple login feature. This allows unauthenticated attackers to log in as any user as long as they know the user's email address.
Configurations

Configuration 1 (hide)

cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:*

History

08 Apr 2026, 17:16

Type Values Removed Values Added
References
  • () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2988788%40mstore-api%2Ftrunk&old=2985882%40mstore-api%2Ftrunk&sfp_email=&sfph_mail= -
CWE CWE-288
Summary (en) The MStore API plugin for WordPress is vulnerable to Unauthorized Account Access and Privilege Escalation in versions up to, and including, 4.10.7 due to improper implementation of the Apple login feature. This allows unauthenticated attackers to log in as any user as long as they know the user's email address. We are disclosing this issue as the developer has not yet released a patch, but continues to release updates and we escalated this issue to the plugin's team 30 days ago. (en) The MStore API plugin for WordPress is vulnerable to Unauthorized Account Access and Privilege Escalation in versions up to, and including, 4.10.7 due to improper implementation of the Apple login feature. This allows unauthenticated attackers to log in as any user as long as they know the user's email address.

21 Nov 2024, 08:16

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/mstore-api/trunk/controllers/flutter-user.php#L821 - Product () https://plugins.trac.wordpress.org/browser/mstore-api/trunk/controllers/flutter-user.php#L821 - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/1c7c0c35-5f44-488f-9fe1-269ea4a73854?source=cve - Third Party Advisory () https://www.wordfence.com/threat-intel/vulnerabilities/id/1c7c0c35-5f44-488f-9fe1-269ea4a73854?source=cve - Third Party Advisory

13 Nov 2023, 18:30

Type Values Removed Values Added
First Time Inspireui
Inspireui mstore Api
References (MISC) https://plugins.trac.wordpress.org/browser/mstore-api/trunk/controllers/flutter-user.php#L821 - (MISC) https://plugins.trac.wordpress.org/browser/mstore-api/trunk/controllers/flutter-user.php#L821 - Product
References (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/1c7c0c35-5f44-488f-9fe1-269ea4a73854?source=cve - (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/1c7c0c35-5f44-488f-9fe1-269ea4a73854?source=cve - Third Party Advisory
CWE NVD-CWE-Other
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:*

07 Nov 2023, 04:18

Type Values Removed Values Added
CWE CWE-288

03 Nov 2023, 13:22

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-03 12:15

Updated : 2026-04-08 17:16


NVD link : CVE-2023-3277

Mitre link : CVE-2023-3277

CVE.ORG link : CVE-2023-3277


JSON object : View

Products Affected

inspireui

  • mstore_api
CWE
CWE-288

Authentication Bypass Using an Alternate Path or Channel

NVD-CWE-Other