First published: Wed Jun 12 2024(Updated: )
The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to arbitrary option updates due to a missing authorization checks on the REST API calls in all versions up to, and including, 0.1.0.38. This makes it possible for unauthenticated attackers to connect the site to InstaWP API, edit arbitrary site options and create administrator accounts.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
InstaWP Connect | <0.1.0.39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4898 is classified as a high severity vulnerability due to its potential for exploitation by unauthenticated attackers.
To address CVE-2024-4898, users should update the InstaWP Connect plugin to a version later than 0.1.0.38.
CVE-2024-4898 allows unauthorized attackers to perform arbitrary option updates via unauthenticated REST API calls.
All versions of the InstaWP Connect plugin up to and including 0.1.0.38 are affected by CVE-2024-4898.
No, CVE-2024-4898 can be exploited without any authentication, making it particularly dangerous.