CVE-2023-3956
InstaWP Connect <= 0.0.9.18 - Missing Authorization to Unauthenticated Post/Taxonomy/User Add/Change/Delete, Customizer Setting Change, Plugin Installation/Activation/Deactication via events_receiver
CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th
The InstaWP Connect plugin for WordPress is vulnerable to unauthorized access of data, modification of data and loss of data due to a missing capability check on the 'events_receiver' function in versions up to, and including, 0.0.9.18. This makes it possible for unauthenticated attackers to add, modify or delete post and taxonomy, install, activate or deactivate plugin, change customizer settings, add or modify or delete user including administrator user.
| CWE | CWE-862 |
| Vendor | instawp |
| Product | instawp connect – 1-click wp staging & migration |
| Published | Jul 27, 2023 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for instawp instawp connect – 1-click wp staging & migration
Be the first to know when new critical vulnerabilities affecting instawp instawp connect – 1-click wp staging & migration are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
instawp / InstaWP Connect – 1-click WP Staging & Migration
0 ≤ 0.0.9.18
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/48e7acf2-61d4-4762-8657-0701910ce69b?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/instawp-connect/tags/0.0.9.18/includes/class-instawp-rest-apis.php#L103 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/2942363/instawp-connect#file5
Credits
István Márton