<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>MStore API Plugin for WordPress — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/mstore-api-plugin-for-wordpress/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 10 May 2026 13:18:59 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/mstore-api-plugin-for-wordpress/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2021-47933 - WordPress MStore API Arbitrary File Upload</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2021-47933-wordpress-file-upload/</link><pubDate>Sun, 10 May 2026 13:18:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2021-47933-wordpress-file-upload/</guid><description>WordPress MStore API 2.0.6 contains an arbitrary file upload vulnerability, allowing unauthenticated attackers to upload malicious files via POST requests to the REST API, leading to remote code execution.</description><content:encoded><![CDATA[<p>CVE-2021-47933 describes an arbitrary file upload vulnerability affecting the MStore API plugin for WordPress, version 2.0.6 and earlier. Unauthenticated attackers can exploit this vulnerability by sending crafted POST requests to the REST API endpoint. Successful exploitation allows the attacker to upload arbitrary files, including PHP scripts, which can then be executed on the server, leading to complete system compromise. This vulnerability poses a significant risk to websites using the affected plugin, as it provides a straightforward path for attackers to gain initial access and establish a persistent foothold. The vulnerability was reported by VulnCheck on May 10, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a WordPress site using the MStore API plugin version 2.0.6 or earlier.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/wp-json/mstore/v1/config_file</code> REST API endpoint.</li>
<li>The POST request includes a file upload with a PHP file containing malicious code.</li>
<li>The attacker names the PHP file with an arbitrary name.</li>
<li>The server saves the uploaded PHP file to a publicly accessible directory.</li>
<li>The attacker sends an HTTP request to the uploaded PHP file&rsquo;s URL.</li>
<li>The web server executes the PHP code within the uploaded file.</li>
<li>The attacker achieves remote code execution on the server, enabling further malicious activities like installing backdoors, data exfiltration, or defacement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2021-47933 allows unauthenticated attackers to achieve remote code execution on the affected WordPress server. This could lead to complete compromise of the website, including data theft, defacement, or use of the server as a launching point for other attacks. Given the wide usage of WordPress and its plugins, this vulnerability could potentially affect thousands of websites if left unpatched. The CVSS v3.1 base score for this vulnerability is 9.8, indicating a critical severity level.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the MStore API plugin to a version later than 2.0.6 to patch CVE-2021-47933.</li>
<li>Implement web application firewall (WAF) rules to block requests to the <code>/wp-json/mstore/v1/config_file</code> endpoint containing suspicious file uploads.</li>
<li>Monitor web server logs for POST requests to the <code>/wp-json/mstore/v1/config_file</code> endpoint and review any uploaded files for malicious content.</li>
<li>Deploy the Sigma rule to detect suspicious file uploads to the vulnerable endpoint.</li>
<li>Restrict file upload permissions on the WordPress server to prevent arbitrary file uploads, mitigating the impact of similar vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>wordpress</category><category>file upload</category><category>remote code execution</category></item></channel></rss>