The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file validation in the /wp-json/instawp-connect/v1/config REST API endpoint in all versions up to, and including, 0.1.0.22. This makes it possible for unauthenticated attackers to upload arbitrary files.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 08 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | InstaWP Connect – 1-click WP Staging & Migration <= 0.1.0.22 - Unauthenticated Arbitrary File Upload |
Thu, 06 Feb 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Instawp
Instawp instawp Connect |
|
| Weaknesses | CWE-434 | |
| CPEs | cpe:2.3:a:instawp:instawp_connect:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Instawp
Instawp instawp Connect |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:33:36.379Z
Reserved: 2024-03-19T19:42:24.552Z
Link: CVE-2024-2667
Updated: 2024-08-01T19:18:48.315Z
Status : Modified
Published: 2024-05-02T17:15:18.443
Modified: 2026-04-08T19:21:10.350
Link: CVE-2024-2667
No data.
OpenCVE Enrichment
No data.
Weaknesses