WordPress MStore API 2.0.6 contains an arbitrary file upload vulnerability that allows unauthenticated attackers to upload malicious files by sending POST requests to the REST API endpoint. Attackers can upload PHP files with arbitrary names to the config_file endpoint to achieve remote code execution on the server.
Metrics
Affected Vendors & Products
References
History
Sun, 10 May 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WordPress MStore API 2.0.6 contains an arbitrary file upload vulnerability that allows unauthenticated attackers to upload malicious files by sending POST requests to the REST API endpoint. Attackers can upload PHP files with arbitrary names to the config_file endpoint to achieve remote code execution on the server. | |
| Title | WordPress MStore API 2.0.6 Arbitrary File Upload | |
| First Time appeared |
Inspireui
Inspireui mstore Api |
|
| Weaknesses | CWE-306 | |
| CPEs | cpe:2.3:a:inspireui:mstore_api:2.0.6:*:*:*:*:*:*:* | |
| Vendors & Products |
Inspireui
Inspireui mstore Api |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-10T12:43:53.547Z
Reserved: 2026-02-01T11:24:18.717Z
Link: CVE-2021-47933
No data.
Status : Received
Published: 2026-05-10T13:16:29.560
Modified: 2026-05-10T13:16:29.560
Link: CVE-2021-47933
No data.
OpenCVE Enrichment
Updated: 2026-05-10T14:45:14Z