The MStore API – Create Native Android & iOS Apps On The Cloud plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the update_user_profile() function in all versions up to, and including, 4.15.3. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files (not including PHP files) on the affected site's server which may make remote code execution possible. This can be paired with a registration endpoint for unauthenticated users to exploit the issue.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Sep 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Inspireui
Inspireui mstore Api |
|
| CPEs | cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Inspireui
Inspireui mstore Api |
Fri, 13 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Sep 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The MStore API – Create Native Android & iOS Apps On The Cloud plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the update_user_profile() function in all versions up to, and including, 4.15.3. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files (not including PHP files) on the affected site's server which may make remote code execution possible. This can be paired with a registration endpoint for unauthenticated users to exploit the issue. | |
| Title | MStore API – Create Native Android & iOS Apps On The Cloud <= 4.15.3 - Authenticated (Subscriber+) Limited Arbitrary File Upload | |
| Weaknesses | CWE-434 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-09-13T15:10:45.570Z
Updated: 2024-09-13T15:30:41.571Z
Reserved: 2024-08-27T19:23:47.160Z
Link: CVE-2024-8242
Updated: 2024-09-13T15:30:34.591Z
Status : Analyzed
Published: 2024-09-13T15:15:16.767
Modified: 2024-09-18T15:47:56.553
Link: CVE-2024-8242
No data.