The MStore API – Create Native Android & iOS Apps On The Cloud plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the update_user_profile() function in all versions up to, and including, 4.15.3. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files (not including PHP files) on the affected site's server which may make remote code execution possible. This can be paired with a registration endpoint for unauthenticated users to exploit the issue.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Sep 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Inspireui
Inspireui mstore Api |
|
CPEs | cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Inspireui
Inspireui mstore Api |
Fri, 13 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 13 Sep 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The MStore API – Create Native Android & iOS Apps On The Cloud plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the update_user_profile() function in all versions up to, and including, 4.15.3. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files (not including PHP files) on the affected site's server which may make remote code execution possible. This can be paired with a registration endpoint for unauthenticated users to exploit the issue. | |
Title | MStore API – Create Native Android & iOS Apps On The Cloud <= 4.15.3 - Authenticated (Subscriber+) Limited Arbitrary File Upload | |
Weaknesses | CWE-434 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-09-13T15:30:41.571Z
Reserved: 2024-08-27T19:23:47.160Z
Link: CVE-2024-8242

Updated: 2024-09-13T15:30:34.591Z

Status : Analyzed
Published: 2024-09-13T15:15:16.767
Modified: 2024-09-18T15:47:56.553
Link: CVE-2024-8242

No data.