Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2023-3277 — Authentication Bypass Using an Alternate Path or Channel in Mstore API Create Native Android IOS Apps ON THE Cloud
Severity
9.8CRITICALNVD
EPSS
38.7%
top 2.74%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedNov 3
Latest updateApr 11
Description
The MStore API plugin for WordPress is vulnerable to Unauthorized Account Access and Privilege Escalation in versions up to, and including, 4.10.7 due to improper implementation of the Apple login feature. This allows unauthenticated attackers to log in as any user as long as they know the user's email address.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages2 packages
🔴Vulnerability Details
4VulDB
▶
GHSA▶
GHSA-7pc7-crj3-6p7v: The MStore API plugin for WordPress is vulnerable to Unauthorized Account Access and Privilege Escalation in versions up to, and including, 4↗2023-11-03
💥Exploits & PoCs
1Nuclei▶
MStore API <= 4.10.7 - Unauthorized Account Access and Privilege Escalation
📋Vendor Advisories
1Red Hat
▶