Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 11 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 10 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mstore
Mstore mstore Api Wordpress Wordpress wordpress |
|
| Vendors & Products |
Mstore
Mstore mstore Api Wordpress Wordpress wordpress |
Sun, 10 May 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WordPress MStore API 2.0.6 contains an arbitrary file upload vulnerability that allows unauthenticated attackers to upload malicious files by sending POST requests to the REST API endpoint. Attackers can upload PHP files with arbitrary names to the config_file endpoint to achieve remote code execution on the server. | |
| Title | WordPress MStore API 2.0.6 Arbitrary File Upload | |
| First Time appeared |
Inspireui
Inspireui mstore Api |
|
| Weaknesses | CWE-306 | |
| CPEs | cpe:2.3:a:inspireui:mstore_api:2.0.6:*:*:*:*:*:*:* | |
| Vendors & Products |
Inspireui
Inspireui mstore Api |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-11T13:23:52.341Z
Reserved: 2026-02-01T11:24:18.717Z
Link: CVE-2021-47933
Updated: 2026-05-11T13:19:00.064Z
Status : Received
Published: 2026-05-10T13:16:29.560
Modified: 2026-05-10T13:16:29.560
Link: CVE-2021-47933
No data.
OpenCVE Enrichment
Updated: 2026-05-10T21:23:31Z