cve/2023/CVE-2023-3076.md

19 lines
840 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-3076](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3076)
![](https://img.shields.io/static/v1?label=Product&message=MStore%20API&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%203.9.9%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen)
### Description
The MStore API WordPress plugin before 3.9.9 does not prevent visitors from creating user accounts with the role of their choice via their wholesale REST API endpoint. This is only exploitable if the site owner paid to access the plugin's pro features.
### POC
#### Reference
2024-05-28 08:49:17 +00:00
- https://wpscan.com/vulnerability/ac662436-29d7-4ea6-84e1-f9e229b44f5b
2024-05-25 21:48:12 +02:00
#### Github
- https://github.com/im-hanzou/MSAPer
- https://github.com/nomi-sec/PoC-in-GitHub