Description
WordPress MStore API 2.0.6 contains an arbitrary file upload vulnerability that allows unauthenticated attackers to upload malicious files by sending POST requests to the REST API endpoint. Attackers can upload PHP files with arbitrary names to the config_file endpoint to achieve remote code execution on the server.
Problem types
Missing Authentication for Critical Function
Product status
Credits
spacehen
References
www.exploit-db.com/exploits/50379 (ExploitDB-50379)
wordpress.org/plugins/mstore-api/ (Official Product Homepage)
www.vulncheck.com/...dpress-mstore-api-arbitrary-file-upload (VulnCheck Advisory: WordPress MStore API 2.0.6 Arbitrary File Upload)