CVE-2024-4898
📋 TL;DR
This vulnerability allows unauthenticated attackers to modify arbitrary WordPress site options and create administrator accounts via the InstaWP Connect plugin's REST API. It affects all WordPress sites using vulnerable versions of the InstaWP Connect plugin. Attackers can take full control of affected websites without any authentication.
💻 Affected Systems
- InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete site takeover: attackers create admin accounts, modify critical site options, inject malicious code, redirect traffic, or deface the website.
Likely Case
Attackers create backdoor admin accounts, modify site settings, and potentially install malware or redirect users to malicious sites.
If Mitigated
If proper network segmentation and web application firewalls are in place, exploitation attempts are blocked before reaching the vulnerable endpoint.
🎯 Exploit Status
The vulnerability requires no authentication and has simple exploitation via crafted HTTP requests to the REST API endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 0.1.0.39 or later
Vendor Advisory: https://wordpress.org/plugins/instawp-connect/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'InstaWP Connect – 1-click WP Staging & Migration'. 4. Click 'Update Now' if available, or download version 0.1.0.39+ from WordPress.org. 5. Activate the updated plugin.
🔧 Temporary Workarounds
Disable the vulnerable plugin
allTemporarily deactivate the InstaWP Connect plugin until patched
wp plugin deactivate instawp-connect
Block REST API endpoint via .htaccess
linuxBlock access to the vulnerable REST API endpoint
RewriteEngine On
RewriteRule ^wp-json/instawp-connect/.*$ - [F,L]
🧯 If You Can't Patch
- Immediately deactivate the InstaWP Connect plugin via WordPress admin or command line
- Implement a web application firewall (WAF) rule to block requests to /wp-json/instawp-connect/* endpoints
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for InstaWP Connect version. If version is 0.1.0.38 or lower, the site is vulnerable.
Check Version:
wp plugin get instawp-connect --field=version
Verify Fix Applied:
Verify the plugin version is 0.1.0.39 or higher in WordPress admin → Plugins → Installed Plugins.
📡 Detection & Monitoring
Log Indicators:
- POST requests to /wp-json/instawp-connect/* from unauthenticated users
- Unusual admin user creation events in WordPress logs
- Multiple failed authentication attempts followed by successful admin creation
Network Indicators:
- HTTP POST requests to /wp-json/instawp-connect/v1/connect or similar endpoints without authentication headers
- Traffic patterns showing admin user creation from unfamiliar IP addresses
SIEM Query:
source="wordpress.log" AND (uri_path="/wp-json/instawp-connect/*" OR message="*New user created*admin*")
🔗 References
- https://plugins.trac.wordpress.org/browser/instawp-connect/tags/0.1.0.38/includes/class-instawp-rest-api.php#L926
- https://www.wordfence.com/threat-intel/vulnerabilities/id/92a00fb4-7b50-43fd-ac04-5d6e29336e9c?source=cve
- https://plugins.trac.wordpress.org/browser/instawp-connect/tags/0.1.0.38/includes/class-instawp-rest-api.php#L926
- https://www.wordfence.com/threat-intel/vulnerabilities/id/92a00fb4-7b50-43fd-ac04-5d6e29336e9c?source=cve