CVE-2024-4898

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to modify arbitrary WordPress site options and create administrator accounts via the InstaWP Connect plugin's REST API. It affects all WordPress sites using vulnerable versions of the InstaWP Connect plugin. Attackers can take full control of affected websites without any authentication.

💻 Affected Systems

Products:
  • InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress
Versions: All versions up to and including 0.1.0.38
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Any WordPress site with the vulnerable plugin installed and activated is affected. The REST API endpoint is accessible by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover: attackers create admin accounts, modify critical site options, inject malicious code, redirect traffic, or deface the website.

🟠

Likely Case

Attackers create backdoor admin accounts, modify site settings, and potentially install malware or redirect users to malicious sites.

🟢

If Mitigated

If proper network segmentation and web application firewalls are in place, exploitation attempts are blocked before reaching the vulnerable endpoint.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and has simple exploitation via crafted HTTP requests to the REST API endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.1.0.39 or later

Vendor Advisory: https://wordpress.org/plugins/instawp-connect/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'InstaWP Connect – 1-click WP Staging & Migration'. 4. Click 'Update Now' if available, or download version 0.1.0.39+ from WordPress.org. 5. Activate the updated plugin.

🔧 Temporary Workarounds

Disable the vulnerable plugin

all

Temporarily deactivate the InstaWP Connect plugin until patched

wp plugin deactivate instawp-connect

Block REST API endpoint via .htaccess

linux

Block access to the vulnerable REST API endpoint

RewriteEngine On
RewriteRule ^wp-json/instawp-connect/.*$ - [F,L]

🧯 If You Can't Patch

  • Immediately deactivate the InstaWP Connect plugin via WordPress admin or command line
  • Implement a web application firewall (WAF) rule to block requests to /wp-json/instawp-connect/* endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for InstaWP Connect version. If version is 0.1.0.38 or lower, the site is vulnerable.

Check Version:

wp plugin get instawp-connect --field=version

Verify Fix Applied:

Verify the plugin version is 0.1.0.39 or higher in WordPress admin → Plugins → Installed Plugins.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-json/instawp-connect/* from unauthenticated users
  • Unusual admin user creation events in WordPress logs
  • Multiple failed authentication attempts followed by successful admin creation

Network Indicators:

  • HTTP POST requests to /wp-json/instawp-connect/v1/connect or similar endpoints without authentication headers
  • Traffic patterns showing admin user creation from unfamiliar IP addresses

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-json/instawp-connect/*" OR message="*New user created*admin*")

🔗 References

📤 Share & Export