The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file validation in the /wp-json/instawp-connect/v1/config REST API endpoint in all versions up to, and including, 0.1.0.22. This makes it possible for unauthenticated attackers to upload arbitrary files.
Metrics
Affected Vendors & Products
References
History
Thu, 06 Feb 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Instawp
Instawp instawp Connect |
|
Weaknesses | CWE-434 | |
CPEs | cpe:2.3:a:instawp:instawp_connect:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Instawp
Instawp instawp Connect |

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-01T19:18:48.315Z
Reserved: 2024-03-19T19:42:24.552Z
Link: CVE-2024-2667

Updated: 2024-08-01T19:18:48.315Z

Status : Analyzed
Published: 2024-05-02T17:15:18.443
Modified: 2025-02-06T18:05:25.020
Link: CVE-2024-2667

No data.