// For flags

CVE-2023-3277

MStore API <= 4.10.7 - Unauthorized Account Access and Privilege Escalation

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The MStore API plugin for WordPress is vulnerable to Unauthorized Account Access and Privilege Escalation in versions up to, and including, 4.10.7 due to improper implementation of the Apple login feature. This allows unauthenticated attackers to log in as any user as long as they know the user's email address. We are disclosing this issue as the developer has not yet released a patch, but continues to release updates and we escalated this issue to the plugin's team 30 days ago.

El complemento API de MStore para WordPress es vulnerable al acceso no autorizado a cuentas y a la escalada de privilegios en versiones hasta la 4.10.7 incluida debido a una implementación incorrecta de la función de inicio de sesión de Apple. Esto permite a atacantes no autenticados iniciar sesión como cualquier usuario siempre que conozcan la dirección de correo electrónico del usuario. Estamos divulgando este problema porque el desarrollador aún no ha lanzado un parche, pero continúa lanzando actualizaciones y escalamos este problema al equipo del complemento hace 30 días.

The MStore API plugin for WordPress is vulnerable to Unauthorized Account Access and Privilege Escalation in versions up to, and including, 4.10.7 due to improper implementation of the Apple login feature. This allows unauthenticated attackers to log in as any user as long as they know the user's email address.

*Credits: Truoc Phan, An Đặng
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-06-15 CVE Reserved
  • 2023-06-19 CVE Published
  • 2023-11-14 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-288: Authentication Bypass Using an Alternate Path or Channel
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Inspireui
Search vendor "Inspireui"
Mstore Api
Search vendor "Inspireui" for product "Mstore Api"
<= 4.10.7
Search vendor "Inspireui" for product "Mstore Api" and version " <= 4.10.7"
wordpress
Affected