CVE-2023-3200 – MStore API <= 3.9.6 - Cross-Site Request Forgery to Order Message Update
https://notcve.org/view.php?id=CVE-2023-3200
The MStore API plugin for WordPress is vulnerable to Cross-Site Request Forgery due to missing nonce validation on the mstore_update_new_order_message function. This makes it possible for unauthenticated attackers to update new order message via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. • https://plugins.trac.wordpress.org/browser/mstore-api/trunk/mstore-api.php#L248 https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2925048%40mstore-api&new=2925048%40mstore-api&sfp_email=&sfph_mail= https://www.wordfence.com/threat-intel/vulnerabilities/id/78f3c503-e255-44d2-8432-48dc2c5f553d?source=cve • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2023-3201 – MStore API <= 3.9.6 - Cross-Site Request Forgery to Order Title Update
https://notcve.org/view.php?id=CVE-2023-3201
The MStore API plugin for WordPress is vulnerable to Cross-Site Request Forgery due to missing nonce validation on the mstore_update_new_order_title function. This makes it possible for unauthenticated attackers to update new order title via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. • https://plugins.trac.wordpress.org/browser/mstore-api/trunk/mstore-api.php#L240 https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2925048%40mstore-api&new=2925048%40mstore-api&sfp_email=&sfph_mail= https://www.wordfence.com/threat-intel/vulnerabilities/id/cb5cb1a5-30d2-434f-90f9-d37aecfbe158?source=cve • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2023-3199 – MStore API <= 3.9.6 - Cross-Site Request Forgery to Order Title Update
https://notcve.org/view.php?id=CVE-2023-3199
The MStore API plugin for WordPress is vulnerable to Cross-Site Request Forgery due to missing nonce validation on the mstore_update_status_order_title function. This makes it possible for unauthenticated attackers to update status order title via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. • https://plugins.trac.wordpress.org/browser/mstore-api/trunk/mstore-api.php#L256 https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2925048%40mstore-api&new=2925048%40mstore-api&sfp_email=&sfph_mail= https://www.wordfence.com/threat-intel/vulnerabilities/id/a604df5d-92b3-4df8-a7ef-00f0ee95cf0f?source=cve • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2023-3131 – MStore API < 3.9.7 - Subscriber+ Unauthorized Settings Update
https://notcve.org/view.php?id=CVE-2023-3131
The MStore API WordPress plugin before 3.9.7 does not secure most of its AJAX actions by implementing privilege checks, nonce checks, or a combination of both. The MStore API plugin for WordPress is vulnerable to unauthorized modification of data due to missing capability checks on several functions called via AJAX actions such as mstore_delete_json_file, mstore_update_limit_product, mstore_update_firebase_server_key, mstore_update_new_order_title, mstore_update_new_order_message, mstore_update_status_order_title, and mstore_update_status_order_message in versions up to, and including, 3.9.6. This makes it possible for authenticated attackers with minimal permissions, such as a subscriber, to perform several unauthorized actions that allow the attacker to control the plugins settings. This was partially patched in 3.9.6 but not fully patched until 3.9.7. CVE-2023-3209 Also applies to this vulnerability. • https://wpscan.com/vulnerability/970735f1-24bb-441c-89b6-5a0959246d6c • CWE-862: Missing Authorization •
CVE-2023-2732 – MStore API <= 3.9.2 - Authentication Bypass
https://notcve.org/view.php?id=CVE-2023-2732
The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.9.2. This is due to insufficient verification on the user being supplied during the add listing REST API request through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id. • https://github.com/RandomRobbieBF/CVE-2023-2732 https://github.com/ThatNotEasy/CVE-2023-2732 https://github.com/Jenderal92/WP-CVE-2023-2732 https://plugins.trac.wordpress.org/browser/mstore-api/tags/3.9.0/controllers/listing-rest-api/class.api.fields.php#L1079 https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2916124%40mstore-api&old=2915729%40mstore-api&sfp_email=&sfph_mail=#file58 https://www.wordfence.com/threat-intel/vulnerabilities/id/f00761a7-fe24-49a3& • CWE-288: Authentication Bypass Using an Alternate Path or Channel •