CVE-2024-6397
📋 TL;DR
The InstaWP Connect WordPress plugin has an authentication bypass vulnerability that allows unauthenticated attackers to log in as any existing user, including administrators, if they know the username. This affects all versions up to and including 0.1.0.44 due to insufficient API key verification. Any WordPress site using this vulnerable plugin is at risk.
💻 Affected Systems
- InstaWP Connect – 1-click WP Staging & Migration
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete site takeover by attackers who can install backdoors, steal data, deface the site, or use it for further attacks.
Likely Case
Administrative account compromise leading to unauthorized content changes, plugin/themes installation, or data exfiltration.
If Mitigated
Limited impact if strong network controls, monitoring, and user privilege restrictions are in place.
🎯 Exploit Status
Exploitation requires only the target username and knowledge of the vulnerable endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 0.1.0.44
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3114674/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Check for updates. 4. Update InstaWP Connect to the latest version. 5. Verify the plugin version is above 0.1.0.44.
🔧 Temporary Workarounds
Disable the plugin
allTemporarily deactivate the InstaWP Connect plugin until patched.
wp plugin deactivate instawp-connect
Restrict API access
allUse web application firewall (WAF) rules to block requests to the vulnerable REST API endpoints.
🧯 If You Can't Patch
- Disable the InstaWP Connect plugin immediately.
- Implement strict network access controls and monitor for suspicious authentication attempts.
🔍 How to Verify
Check if Vulnerable:
Check the plugin version in WordPress admin under Plugins > Installed Plugins. If version is 0.1.0.44 or lower, the site is vulnerable.
Check Version:
wp plugin get instawp-connect --field=version
Verify Fix Applied:
After updating, confirm the plugin version is above 0.1.0.44 and test that unauthorized API requests are properly rejected.
📡 Detection & Monitoring
Log Indicators:
- Unusual authentication attempts via REST API endpoints
- Multiple failed login attempts followed by successful admin login from unexpected IPs
Network Indicators:
- HTTP POST requests to /wp-json/instawp-connect/v1/* endpoints from unauthenticated sources
SIEM Query:
source="wordpress.log" AND ("instawp-connect" OR "/wp-json/instawp-connect") AND (status=200 OR "authentication")
🔗 References
- https://plugins.trac.wordpress.org/browser/instawp-connect/tags/0.1.0.43/includes/apis/class-instawp-rest-api.php#L256
- https://plugins.trac.wordpress.org/browser/instawp-connect/tags/0.1.0.43/includes/class-instawp-hooks.php#L28
- https://plugins.trac.wordpress.org/browser/instawp-connect/tags/0.1.0.43/includes/class-instawp-hooks.php#L40
- https://plugins.trac.wordpress.org/changeset/3109305/
- https://plugins.trac.wordpress.org/changeset/3114674/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/963f2485-3afa-4e17-8278-b75415af3915?source=cve
- https://plugins.trac.wordpress.org/browser/instawp-connect/tags/0.1.0.43/includes/apis/class-instawp-rest-api.php#L256
- https://plugins.trac.wordpress.org/browser/instawp-connect/tags/0.1.0.43/includes/class-instawp-hooks.php#L28
- https://plugins.trac.wordpress.org/browser/instawp-connect/tags/0.1.0.43/includes/class-instawp-hooks.php#L40
- https://plugins.trac.wordpress.org/changeset/3109305/
- https://plugins.trac.wordpress.org/changeset/3114674/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/963f2485-3afa-4e17-8278-b75415af3915?source=cve