First published: Thu Jul 11 2024(Updated: )
The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 0.1.0.44. This is due to insufficient verification of the API key. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username, and to perform a variety of other administrative tasks. NOTE: This vulnerability was partially fixed in 0.1.0.44, but was still exploitable via Cross-Site Request Forgery.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
InstaWP Connect | <0.1.0.45 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6397 has a high severity due to the potential for unauthorized access.
To fix CVE-2024-6397, update the InstaWP Connect plugin to version 0.1.0.45 or later.
All versions of the InstaWP Connect plugin up to and including 0.1.0.44 are affected by CVE-2024-6397.
CVE-2024-6397 is an authentication bypass vulnerability.
CVE-2024-6397 can be exploited by unauthenticated attackers, allowing them to log in without proper credentials.