The MStore API WordPress plugin before 3.9.8 does not sanitise and escape a parameter before using it in a SQL statement, leading to a Blind SQL injection exploitable by unauthenticated users. This is only exploitable if the site owner elected to pay to get access to the plugins' pro features, and uses the woocommerce-appointments plugin.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 12 Nov 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-11-12T14:05:29.463Z
Reserved: 2023-06-02T20:28:25.930Z
Link: CVE-2023-3077
Updated: 2024-08-02T06:41:04.132Z
Status : Modified
Published: 2023-07-10T16:15:54.913
Modified: 2024-11-21T08:16:23.567
Link: CVE-2023-3077
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.