Lucene search

K
cve[email protected]CVE-2020-36713
HistoryJun 07, 2023 - 2:15 a.m.

CVE-2020-36713

2023-06-0702:15:11
CWE-306
web.nvd.nist.gov
15
cve-2020-36713
mstore api
wordpress
authentication bypass
unrestricted access
administrator accounts
privilege escalation

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.7%

The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.1.5. This is due to unrestricted access to the ‘register’ and ‘update_user_profile’ routes. This makes it possible for unauthenticated attackers to create new administrator accounts, delete existing administrator accounts, or escalate privileges on any account.

Affected configurations

Vulners
NVD
Node
inspireuimstore_apiRange<2.1.6
VendorProductVersionCPE
inspireuimstore_api*cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "inspireui",
    "product": "MStore API",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThan": "2.1.6",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.7%

Related for CVE-2020-36713