CVE-2024-4898

The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to arbitrary option updates due to a missing authorization checks on the REST API calls in all versions up to, and including, 0.1.0.38. This makes it possible for unauthenticated attackers to connect the site to InstaWP API, edit arbitrary site options and create administrator accounts.
Configurations

Configuration 1 (hide)

cpe:2.3:a:instawp:instawp_connect:*:*:*:*:*:wordpress:*:*

History

23 Jul 2024, 17:50

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/instawp-connect/tags/0.1.0.38/includes/class-instawp-rest-api.php#L926 - () https://plugins.trac.wordpress.org/browser/instawp-connect/tags/0.1.0.38/includes/class-instawp-rest-api.php#L926 - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/92a00fb4-7b50-43fd-ac04-5d6e29336e9c?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/92a00fb4-7b50-43fd-ac04-5d6e29336e9c?source=cve - Third Party Advisory
CPE cpe:2.3:a:instawp:instawp_connect:*:*:*:*:*:wordpress:*:*
CWE CWE-862
First Time Instawp instawp Connect
Instawp

12 Jun 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-12 11:15

Updated : 2024-07-23 17:50


NVD link : CVE-2024-4898

Mitre link : CVE-2024-4898


JSON object : View

Products Affected

instawp

  • instawp_connect
CWE
CWE-862

Missing Authorization