The MStore API plugin for WordPress is vulnerable to Cross-Site Request Forgery due to missing nonce validation on the mstore_update_status_order_message function. This makes it possible for unauthenticated attackers to update status order message via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Tue, 03 Dec 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-12-03T16:32:34.921Z
Reserved: 2023-06-12T13:48:53.008Z
Link: CVE-2023-3198

Updated: 2024-08-02T06:48:07.816Z

Status : Modified
Published: 2023-06-14T02:15:08.067
Modified: 2024-11-21T08:16:40.660
Link: CVE-2023-3198

No data.