CVSS Score of 10 (low)


Published Jul 10, 2023
Updated: Nov 7, 2023


CVE-2023-3077 is a vulnerability in the MStore API WordPress plugin before version 3.9.8. The vulnerability allows unauthenticated users to exploit a Blind SQL injection by not properly sanitizing and escaping a parameter used in an SQL statement. This vulnerability is only exploitable if the site owner has paid for access to the plugin's pro features and uses the woocommerce-appointments plugin. The affected products include h7-v_3, h7-v_6, h7-v_7, h7-v_4, h7-v_5, h7-v_8, h7-v_9, rZrZTn, rZrZTm, rZrZTl, and many others. The potential danger of this vulnerability is high, as it can lead to unauthorized access to sensitive data and compromise the integrity of the affected organization's systems. It is recommended to update to version 3.9.8 of the MStore API WordPress plugin or apply any available patches or fixes provided by the vendor to remediate this vulnerability.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-3077 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options