CVE-2025-11127
BaseFortify
Publication date: 2025-11-21
Last updated on: 2025-11-21
Assigner: WPScan
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mstoreapp | mstoreapp_mobile | 2.08 |
| mstoreapp | mstoreapp_multivendor | 9.0.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Mstoreapp Mobile App WordPress plugin through version 2.08 and Mstoreapp Mobile Multivendor through version 9.0.1. It occurs because the plugins do not properly verify user identity when handling an AJAX action. As a result, unauthenticated users can retrieve a valid session for arbitrary users if they know the users' email addresses.
How can this vulnerability impact me? :
This vulnerability can allow an attacker who knows a user's email address to obtain a valid session for that user without authentication. This could lead to unauthorized access to the user's account and potentially sensitive information or actions within the application.