NA

CVE-2023-3076

Published: 10/07/2023 Updated: 07/11/2023
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

The MStore API WordPress plugin prior to 3.9.9 does not prevent visitors from creating user accounts with the role of their choice via their wholesale REST API endpoint. This is only exploitable if the site owner paid to access the plugin's pro features.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

inspireui mstore api

Github Repositories

Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (Mass Add Admin + PHP File Upload)

MSAPer | CVE-2023-3076 - MStore API Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API &lt; 399 - Unauthenticated Privilege Escalation (Mass Add Admin + PHP File Upload) Using GNU Parallel You must have parallel for run this tool If you found error like "$'\r': command not found" just do "dos2unix msapers