Cross-Site Request Forgery in InstaWP Connect Plugin for WordPress
CVE-2024-13913
8.8HIGH
Key Information:
- Vendor
- InstaWP
- Status
- InstaWP Connect – 1-click WP Staging & Migration
- Vendor
- CVE Published:
- 14 March 2025
Summary
The InstaWP Connect plugin, used for 1-click WordPress staging and migration, contains a susceptibility to Cross-Site Request Forgery due to inadequate nonce validation in the '/migrate/templates/main.php' file. This vulnerability allows unauthenticated attackers to include and execute arbitrary files on the server. Exploiting this flaw could allow the execution of any PHP code contained in the files, potentially leading to unauthorized access, sensitive data retrieval, and code execution by exploiting upload functionalities that may permit seemingly 'safe' file types.
Affected Version(s)
InstaWP Connect – 1-click WP Staging & Migration * <= 0.1.0.83
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Bassem Essam