CVE-2025-11127

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to hijack user sessions in Mstoreapp WordPress plugins by knowing the target's email address. Attackers can impersonate any user, including administrators, on affected WordPress sites. All sites using vulnerable versions of Mstoreapp Mobile App or Mstoreapp Mobile Multivendor plugins are affected.

💻 Affected Systems

Products:
  • Mstoreapp Mobile App WordPress plugin
  • Mstoreapp Mobile Multivendor
Versions: Mstoreapp Mobile App through 2.08, Mstoreapp Mobile Multivendor through 9.0.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress sites with these plugins installed. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover where attackers gain administrative access, install backdoors, steal sensitive data, deface websites, or deploy ransomware.

🟠

Likely Case

Account takeover of regular users leading to data theft, privilege escalation, or unauthorized actions within the application.

🟢

If Mitigated

Limited impact if proper network segmentation, strong authentication, and monitoring are in place to detect anomalous session activity.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only the target's email address and basic HTTP requests. No authentication or special tools needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Mstoreapp Mobile App 2.09+, Mstoreapp Mobile Multivendor 9.0.2+

Vendor Advisory: https://wpscan.com/vulnerability/6432bd1a-6e44-4a3f-890b-df2bd877d626/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Mstoreapp plugins and update to latest version. 4. Verify update completed successfully.

🔧 Temporary Workarounds

Disable vulnerable plugins

all

Temporarily disable Mstoreapp plugins until patched

wp plugin deactivate mstoreapp-mobile-app
wp plugin deactivate mstoreapp-mobile-multivendor

Restrict AJAX endpoints

linux

Block access to vulnerable AJAX endpoints via web application firewall or .htaccess

# Add to .htaccess: RewriteRule ^wp-admin/admin-ajax\.php.*mstoreapp.* - [F]

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the WordPress admin interface
  • Enable multi-factor authentication for all user accounts to mitigate session hijacking impact

🔍 How to Verify

Check if Vulnerable:

Check WordPress plugin versions in admin panel or via wp-cli: wp plugin list --name=mstoreapp

Check Version:

wp plugin list --name=mstoreapp --fields=name,version

Verify Fix Applied:

Confirm plugin versions are 2.09+ for Mobile App or 9.0.2+ for Mobile Multivendor

📡 Detection & Monitoring

Log Indicators:

  • Unusual AJAX requests to admin-ajax.php with mstoreapp parameters
  • Multiple failed login attempts followed by successful logins from new IPs
  • User sessions originating from unexpected geographic locations

Network Indicators:

  • HTTP POST requests to /wp-admin/admin-ajax.php containing 'action=mstoreapp' parameters
  • Unusual traffic patterns to AJAX endpoints from unauthenticated sources

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php" AND query_string="*mstoreapp*")

🔗 References

📤 Share & Export