First published: Thu May 02 2024(Updated: )
The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file validation in the /wp-json/instawp-connect/v1/config REST API endpoint in all versions up to, and including, 0.1.0.22. This makes it possible for unauthenticated attackers to upload arbitrary files.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
InstaWP | <=0.1.0.22 | |
InstaWP Connect | <0.1.0.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2667 has a critical severity level due to the potential for arbitrary file uploads.
To mitigate CVE-2024-2667, update the InstaWP Connect plugin to version 0.1.0.23 or later.
All versions of InstaWP Connect up to and including 0.1.0.22 are affected by CVE-2024-2667.
Yes, CVE-2024-2667 allows unauthenticated users to exploit the vulnerability by uploading arbitrary files.
CVE-2024-2667 can be exploited through insufficient file validation in the /wp-json/instawp-connect/v1/config REST API endpoint.