MStore API

Information

Software Type Plugin
Software Slug mstore-api (view on wordpress.org)
Software Status Active
Software Author inspireui
Software Website github.com
Software Downloads 188,199
Software Active Installs 4,000
Software Record Last Updated October 4, 2023

17 vulnerabilities

9.8
CVE ID Unknown
Oct 5, 2021
Researcher: spacehen
Title CVE ID CVSS Researchers Date
MStore API <= 4.0.1 - Unauthenticated SQL Injection CVE-2023-3197 9.8 Truoc Phan, An Đặng June 23, 2023
MStore API <= 3.9.7 - Unauthenticated SQL Injection CVE-2022-47614 9.8 Lucio Sá June 19, 2023
MStore API <= 3.9.8 - Unauthenticated Privilege Escalation CVE-2023-3076 9.8 Truoc Phan June 19, 2023
MStore API <= 3.9.7 - Unauthenticated SQL Injection CVE-2023-3077 9.8 Truoc Phan June 19, 2023
MStore API <= 3.9.6 - Cross-Site Request Forgery to Order Title Update CVE-2023-3199 4.3 Truoc Phan June 13, 2023
MStore API <= 3.9.6 - Cross-Site Request Forgery to Firebase Server Key Update CVE-2023-3202 4.3 Truoc Phan June 13, 2023
MStore API <= 3.9.6 - Cross-Site Request Forgery to Order Message Update CVE-2023-3200 4.3 Truoc Phan June 13, 2023
MStore API <= 3.9.6 - Cross-Site Request Forgery to Product Limit Update CVE-2023-3203 4.3 Truoc Phan June 13, 2023
MStore API <= 3.9.6 - Cross-Site Request Forgery to Order Title Update CVE-2023-3201 4.3 Truoc Phan June 13, 2023
MStore API <= 3.9.6 - Cross-Site Request Forgery to Order Status Update CVE-2023-3198 4.3 Truoc Phan June 13, 2023
MStore API <= 3.9.6 - Missing Authorization CVE-2023-3131 6.5 Truoc Phan June 12, 2023
MStore API <= 3.9.2 - Authentication Bypass CVE-2023-2732 9.8 Lana Codes May 24, 2023
MStore API <= 3.9.1 - Authentication Bypass CVE-2023-2734 9.8 Lana Codes May 22, 2023
MStore API <= 3.9.0 - Authentication Bypass CVE-2023-2733 9.8 Lana Codes May 17, 2023
MStore API < 3.4.5 - Arbitrary File Upload 9.8 spacehen October 5, 2021
MStore API <= 3.1.9 - Authentication Bypass CVE-2021-24148 9.8 Vincent Datrier February 2, 2021
MStore API <= 2.1.5 - Authentication Bypass CVE-2020-36713 9.8 Jerome Bruandet March 11, 2020

All the threat data shared in this database is powered by Wordfence Intelligence Enterprise.
Interested in integrating this data into your platform or network?
Contact us now to discuss API access to our Wordfence Intelligence Enterprise Data Feeds.

Inquire Now

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation