CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ⬡ Vulnerabilities & CVEs Apr 09, 2026

CVE-2026-3568 | inspireui MStore API Plugin up to 4.18.3 on WordPress flutter-user.php update_user_profile meta_data authorization

VulDB Archived Apr 09, 2026 ✓ Full text saved

A vulnerability, which was classified as critical , was found in inspireui MStore API Plugin up to 4.18.3 on WordPress. Affected is the function update_user_profile of the file controllers/flutter-user.php . Such manipulation of the argument meta_data leads to authorization bypass. This vulnerability is listed as CVE-2026-3568 . The attack may be performed from remote. There is no available exploit. You should upgrade the affected component.

Full text archived locally
✦ AI Summary · Claude Sonnet


    VDB-356499 · CVE-2026-3568 · GCVE-0-2026-3568 INSPIREUI MSTORE API PLUGIN UP TO 4.18.3 ON WORDPRESS FLUTTER-USER.PHP UPDATE_USER_PROFILE META_DATA AUTHORIZATION HISTORYDIFFRELATEJSONXMLCTI CVSS Meta Temp Score Current Exploit Price (≈) CTI Interest Score 5.2 $0-$5k 1.06+ Summaryinfo A vulnerability has been found in inspireui MStore API Plugin up to 4.18.3 on WordPress and classified as critical. Affected by this vulnerability is the function update_user_profile of the file controllers/flutter-user.php. Performing a manipulation of the argument meta_data results in authorization. This vulnerability is cataloged as CVE-2026-3568. It is possible to initiate the attack remotely. There is no exploit available. The affected component should be upgraded. Detailsinfo A vulnerability classified as critical has been found in inspireui MStore API Plugin up to 4.18.3 on WordPress. This affects the function update_user_profile of the file controllers/flutter-user.php. The manipulation of the argument meta_data with an unknown input leads to a authorization vulnerability. CWE is classifying the issue as CWE-639. The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is: The MStore API plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.18.3. This is due to the update_user_profile() function in controllers/flutter-user.php processing the 'meta_data' JSON parameter without any allowlist, blocklist, or validation of meta keys. The function reads raw JSON from php://input (line 1012), decodes it (line 1013), authenticates the user via cookie validation (line 1015), and then directly iterates over the user-supplied meta_data array passing arbitrary keys and values to update_user_meta() (line 1080) with no sanitization or restrictions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify arbitrary user meta fields on their own accounts, including sensitive fields like wp_user_level (to escalate to administrator-level legacy checks), plugin-specific authorization flags (e.g., _wpuf_user_active, aiowps_account_status), and billing/profile fields with unsanitized values (potentially enabling Stored XSS in admin contexts). Note that wp_capabilities cannot be directly exploited this way because it requires a serialized array value, but wp_user_level (a simple integer) and numerous plugin-specific meta keys are exploitable. The weakness was shared by Osvaldo Noe Gonzalez Del Rio. It is possible to read the advisory at wordfence.com. This vulnerability is uniquely identified as CVE-2026-3568 since 03/04/2026. The exploitability is told to be easy. It is possible to initiate the attack remotely. Technical details of the vulnerability are known, but there is no available exploit. By approaching the search of inurl:controllers/flutter-user.php it is possible to find vulnerable targets with Google Hacking. Upgrading to version 4.18.3 eliminates this vulnerability. Productinfo Type WordPress Plugin Vendor inspireui Name MStore API Plugin Version 4.18.0 4.18.1 4.18.2 4.18.3 CPE 2.3info 🔒 🔒 🔒 CPE 2.2info 🔒 🔒 🔒 CVSSv4info VulDB Vector: 🔒 VulDB Reliability: 🔍 CVSSv3info VulDB Meta Base Score: 5.3 VulDB Meta Temp Score: 5.2 VulDB Base Score: 6.3 VulDB Temp Score: 6.0 VulDB Vector: 🔒 VulDB Reliability: 🔍 CNA Base Score: 4.3 CNA Vector (Wordfence): 🔒 CVSSv2info Vector Complexity Authentication Confidentiality Integrity Availability Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock VulDB Base Score: 🔒 VulDB Temp Score: 🔒 VulDB Reliability: 🔍 Exploitinginfo Class: Authorization CWE: CWE-639 / CWE-285 / CWE-266 CAPEC: 🔒 ATT&CK: 🔒 Physical: No Local: No Remote: Yes Availability: 🔒 Status: Not defined Google Hack: 🔒 Price Prediction: 🔍 Current Price Estimation: 🔒 0-Day Unlock Unlock Unlock Unlock Today Unlock Unlock Unlock Unlock Threat Intelligenceinfo Interest: 🔍 Active Actors: 🔍 Active APT Groups: 🔍 Countermeasuresinfo Recommended: Upgrade Status: 🔍 0-Day Time: 🔒 Upgrade: MStore API Plugin 4.18.3 Timelineinfo 03/04/2026 CVE reserved 04/09/2026 +35 days Advisory disclosed 04/09/2026 +0 days VulDB entry created 04/09/2026 +0 days VulDB entry last update Sourcesinfo Advisory: wordfence.com Researcher: Osvaldo Noe Gonzalez Del Rio Status: Confirmed CVE: CVE-2026-3568 (🔒) GCVE (CVE): GCVE-0-2026-3568 GCVE (VulDB): GCVE-100-356499 Entryinfo Created: 04/09/2026 08:09 Changes: 04/09/2026 08:09 (68) Complete: 🔍 Cache ID: 99:B71:101 Discussion No comments yet. Languages: en. Please log in to comment. ◂ PreviousOverviewNext ▸
    💬 Team Notes
    Article Info
    Source
    VulDB
    Category
    ⬡ Vulnerabilities & CVEs
    Published
    Apr 09, 2026
    Archived
    Apr 09, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗