WF-5954c35a-7d0a-4bc5-9cad-3223e7be56eb-instawp-connect

InstaWP Connect <= 0.1.0.8 - Cross-Site Request Forgery via create_file_db_manager

mediumMissing Authorization
4.3
CVSS Score
4.3
CVSS Score
medium
Severity
0.1.0.9
Patched in
11d
Time to patch

Description

The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.1.0.8. This is due to missing or incorrect nonce validation on the create_file_db_manager() function. This makes it possible for unauthenticated attackers to make use of the file and database manager functionality provided by the plugin via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVSS Vector Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
None
Confidentiality
Low
Integrity
None
Availability

Technical Details

Affected versions<=0.1.0.8
PublishedJanuary 12, 2024
Last updatedJanuary 22, 2024
Affected plugininstawp-connect

Check if your site is affected.

Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.