CVE-2024-37228

10.0 CRITICAL

📋 TL;DR

This critical vulnerability in the InstaWP Connect WordPress plugin allows attackers to upload arbitrary files and execute malicious code on affected websites. It affects all WordPress sites running InstaWP Connect versions up to 0.1.0.38. Attackers can gain complete control of vulnerable websites.

💻 Affected Systems

Products:
  • InstaWP Connect WordPress Plugin
Versions: n/a through 0.1.0.38
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with vulnerable plugin versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the WordPress site, including data theft, defacement, malware distribution, and use as a foothold for attacking other systems.

🟠

Likely Case

Website takeover, backdoor installation, credential theft, and potential compromise of the hosting environment.

🟢

If Mitigated

Limited impact if proper web application firewalls and file upload restrictions are in place, though risk remains high.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows unauthenticated file upload leading to code execution, making exploitation trivial.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.1.0.39 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/instawp-connect/wordpress-instawp-connect-plugin-0-1-0-38-arbitrary-file-upload-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find InstaWP Connect and update to version 0.1.0.39 or later. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Disable InstaWP Connect Plugin

all

Temporarily disable the vulnerable plugin until patching is possible

wp plugin deactivate instawp-connect

Restrict File Uploads via .htaccess

linux

Block PHP file uploads to the vulnerable plugin directory

<FilesMatch "\.(php|php5|php7|phtml|phar)$">
    Order Allow,Deny
    Deny from all
</FilesMatch>

🧯 If You Can't Patch

  • Immediately disable the InstaWP Connect plugin
  • Implement a web application firewall (WAF) with rules to block file upload exploits

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > InstaWP Connect version. If version is 0.1.0.38 or earlier, you are vulnerable.

Check Version:

wp plugin get instawp-connect --field=version

Verify Fix Applied:

Verify InstaWP Connect plugin version is 0.1.0.39 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to wp-content/plugins/instawp-connect/
  • POST requests to instawp-connect endpoints with file upload parameters
  • Execution of unexpected PHP files in plugin directory

Network Indicators:

  • HTTP POST requests with file uploads to /wp-content/plugins/instawp-connect/ endpoints
  • Unexpected outbound connections from WordPress server after file upload

SIEM Query:

source="wordpress.log" AND ("instawp-connect" AND "upload") OR ("POST" AND "/wp-content/plugins/instawp-connect/")

🔗 References

📤 Share & Export