CVE-2023-3077

CRITICAL NUCLEI

MStore API WordPress <3.9.8 - SQL Injection

Title source: llm

Description

The MStore API WordPress plugin before 3.9.8 does not sanitise and escape a parameter before using it in a SQL statement, leading to a Blind SQL injection exploitable by unauthenticated users. This is only exploitable if the site owner elected to pay to get access to the plugins' pro features, and uses the woocommerce-appointments plugin.

Nuclei Templates (1)

MStore API < 3.9.8 - SQL Injection
CRITICALVERIFIEDby DhiyaneshDK
Shodan: http.html:/wp-content/plugins/mstore-api/
FOFA: body=/wp-content/plugins/mstore-api/

Scores

CVSS v3 9.8
EPSS 0.6133
EPSS Percentile 98.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

Status published
Products (1)
inspireui/mstore_api < 3.9.8
Published Jul 10, 2023
Tracked Since Feb 18, 2026