The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file validation in the /wp-json/instawp-connect/v1/config REST API endpoint in all versions up to, and including, 0.1.0.22. This makes it possible for unauthenticated attackers to upload arbitrary files.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 06 Feb 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Instawp
Instawp instawp Connect |
|
| Weaknesses | CWE-434 | |
| CPEs | cpe:2.3:a:instawp:instawp_connect:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Instawp
Instawp instawp Connect |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-01T19:18:48.315Z
Reserved: 2024-03-19T19:42:24.552Z
Link: CVE-2024-2667
Updated: 2024-08-01T19:18:48.315Z
Status : Analyzed
Published: 2024-05-02T17:15:18.443
Modified: 2025-02-06T18:05:25.020
Link: CVE-2024-2667
No data.
OpenCVE Enrichment
No data.
Weaknesses