CVE-2023-3077

CVSS Score of 10 (low)

Details

Published Jul 10, 2023
Updated: Nov 7, 2023
CWE ID 89

Summary

CVE-2023-3077 is a vulnerability in the MStore API WordPress plugin before version 3.9.8. The vulnerability allows unauthenticated users to exploit a Blind SQL injection by not properly sanitizing and escaping a parameter used in an SQL statement. This vulnerability is only exploitable if the site owner has paid for access to the plugin's pro features and uses the woocommerce-appointments plugin. The affected products include h7-v_3, h7-v_6, h7-v_7, h7-v_4, h7-v_5, h7-v_8, h7-v_9, rZrZTn, rZrZTm, rZrZTl, and many others. The potential danger of this vulnerability is high, as it can lead to unauthorized access to sensitive data and compromise the integrity of the affected organization's systems. It is recommended to update to version 3.9.8 of the MStore API WordPress plugin or apply any available patches or fixes provided by the vendor to remediate this vulnerability.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-3077 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions