CVE-2020-36713Authentication Bypass Using an Alternate Path or Channel in Mstore API Create Native Android IOS Apps ON THE Cloud

Severity
9.8CRITICALNVD
EPSS
0.9%
top 23.89%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 7

Description

The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.1.5. This is due to unrestricted access to the 'register' and 'update_user_profile' routes. This makes it possible for unauthenticated attackers to create new administrator accounts, delete existing administrator accounts, or escalate privileges on any account.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

🔴Vulnerability Details

2
GHSA
GHSA-4w36-8q8w-r4jp: The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 22023-06-07
CVEList
MStore API <= 2.1.5 - Authentication Bypass2023-06-07
CVE-2020-36713 — CRITICAL severity | cvebase