CVE-2024-2667
📋 TL;DR
The InstaWP Connect WordPress plugin has an unauthenticated arbitrary file upload vulnerability in its REST API endpoint. This allows attackers to upload malicious files to vulnerable WordPress sites. All WordPress sites using this plugin up to version 0.1.0.22 are affected.
💻 Affected Systems
- InstaWP Connect – 1-click WP Staging & Migration
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise via remote code execution, website defacement, data theft, or ransomware deployment.
Likely Case
Website defacement, backdoor installation, credential theft, or malware distribution.
If Mitigated
Limited impact with proper file system permissions and web application firewalls in place.
🎯 Exploit Status
Simple HTTP POST requests to the vulnerable endpoint can exploit this. Public exploit code exists.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 0.1.0.23 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find 'InstaWP Connect' and click 'Update Now'. 4. Verify version is 0.1.0.23 or higher.
🔧 Temporary Workarounds
Disable vulnerable REST endpoint
allBlock access to the vulnerable API endpoint via web server configuration or firewall.
# Apache: Add to .htaccess
RewriteRule ^wp-json/instawp-connect/v1/config - [F,L]
# Nginx: Add to server block
location ~* ^/wp-json/instawp-connect/v1/config { deny all; }
Disable plugin
linuxTemporarily disable the InstaWP Connect plugin until patched.
wp plugin deactivate instawp-connect
🧯 If You Can't Patch
- Disable the InstaWP Connect plugin immediately.
- Implement strict file upload restrictions and monitor for suspicious file uploads.
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → InstaWP Connect version. If version ≤ 0.1.0.22, you are vulnerable.
Check Version:
wp plugin get instawp-connect --field=version
Verify Fix Applied:
After updating, confirm plugin version is 0.1.0.23 or higher in WordPress admin.
📡 Detection & Monitoring
Log Indicators:
- HTTP POST requests to /wp-json/instawp-connect/v1/config
- File uploads to unusual directories like wp-content/uploads with suspicious extensions
Network Indicators:
- Unusual traffic to the vulnerable REST endpoint from unauthenticated sources
SIEM Query:
source="web_server" AND (uri="/wp-json/instawp-connect/v1/config" OR uri="/wp-json/instawp-connect/v1/config/") AND method="POST"
🔗 References
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3061039%40instawp-connect&new=3061039%40instawp-connect&sfp_email=&sfph_mail=
- https://www.wordfence.com/threat-intel/vulnerabilities/id/f6aead8d-c136-4952-ad03-86fe0f144dea?source=cve
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3061039%40instawp-connect&new=3061039%40instawp-connect&sfp_email=&sfph_mail=
- https://www.wordfence.com/threat-intel/vulnerabilities/id/f6aead8d-c136-4952-ad03-86fe0f144dea?source=cve