WordPress MStore API 2.0.6 contains an arbitrary file upload vulnerability that allows unauthenticated attackers to upload malicious files by sending POST requests to the REST API endpoint. Attackers can upload PHP files with arbitrary names to the config_file endpoint to achieve remote code execution on the server.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 10 May 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WordPress MStore API 2.0.6 contains an arbitrary file upload vulnerability that allows unauthenticated attackers to upload malicious files by sending POST requests to the REST API endpoint. Attackers can upload PHP files with arbitrary names to the config_file endpoint to achieve remote code execution on the server. | |
| Title | WordPress MStore API 2.0.6 Arbitrary File Upload | |
| First Time appeared |
Inspireui
Inspireui mstore Api |
|
| Weaknesses | CWE-306 | |
| CPEs | cpe:2.3:a:inspireui:mstore_api:2.0.6:*:*:*:*:*:*:* | |
| Vendors & Products |
Inspireui
Inspireui mstore Api |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-10T12:43:53.547Z
Reserved: 2026-02-01T11:24:18.717Z
Link: CVE-2021-47933
No data.
Status : Received
Published: 2026-05-10T13:16:29.560
Modified: 2026-05-10T13:16:29.560
Link: CVE-2021-47933
No data.
OpenCVE Enrichment
Updated: 2026-05-10T14:45:14Z
Weaknesses