2 results (0.004 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 0.1.0.44. This is due to insufficient verification of the API key. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username, and to perform a variety of other administrative tasks. NOTE: This vulnerability was partially fixed in 0.1.0.44, but was still exploitable via Cross-Site Request Forgery. El complemento InstaWP Connect – 1-click WP Staging & Migration para WordPress es vulnerable a la omisión de autenticación en todas las versiones hasta la 0.1.0.44 incluida. • https://plugins.trac.wordpress.org/browser/instawp-connect/tags/0.1.0.43/includes/apis/class-instawp-rest-api.php#L256 https://plugins.trac.wordpress.org/browser/instawp-connect/tags/0.1.0.43/includes/class-instawp-hooks.php#L28 https://plugins.trac.wordpress.org/browser/instawp-connect/tags/0.1.0.43/includes/class-instawp-hooks.php#L40 https://plugins.trac.wordpress.org/changeset/3109305 https://plugins.trac.wordpress.org/changeset/3114674 https://www.wordfence.com/threat-intel/vulnerabilities • CWE-288: Authentication Bypass Using an Alternate Path or Channel •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file validation in the /wp-json/instawp-connect/v1/config REST API endpoint in all versions up to, and including, 0.1.0.22. This makes it possible for unauthenticated attackers to upload arbitrary files. El complemento InstaWP Connect – 1-click WP Staging & Migration para WordPress es vulnerable a cargas de archivos arbitrarias debido a una validación de archivos insuficiente en el endpoint de la API REST /wp-json/instawp-connect/v1/config en todas las versiones hasta e incluida, 0.1.0.22. Esto hace posible que atacantes no autenticados carguen archivos arbitrarios. • https://github.com/Puvipavan/CVE-2024-2667 https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3061039%40instawp-connect&new=3061039%40instawp-connect&sfp_email=&sfph_mail= https://www.wordfence.com/threat-intel/vulnerabilities/id/f6aead8d-c136-4952-ad03-86fe0f144dea?source=cve • CWE-434: Unrestricted Upload of File with Dangerous Type •