🔐 CVE Alert

CVE-2023-3956

CRITICAL 9.8

InstaWP Connect <= 0.0.9.18 - Missing Authorization to Unauthenticated Post/Taxonomy/User Add/Change/Delete, Customizer Setting Change, Plugin Installation/Activation/Deactication via events_receiver

CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th

The InstaWP Connect plugin for WordPress is vulnerable to unauthorized access of data, modification of data and loss of data due to a missing capability check on the 'events_receiver' function in versions up to, and including, 0.0.9.18. This makes it possible for unauthenticated attackers to add, modify or delete post and taxonomy, install, activate or deactivate plugin, change customizer settings, add or modify or delete user including administrator user.

CWE CWE-862
Vendor instawp
Product instawp connect – 1-click wp staging & migration
Published Jul 27, 2023
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for instawp instawp connect – 1-click wp staging & migration

Be the first to know when new critical vulnerabilities affecting instawp instawp connect – 1-click wp staging & migration are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

instawp / InstaWP Connect – 1-click WP Staging & Migration
0 ≤ 0.0.9.18

References

NVD ↗ CVE.org ↗ EPSS Data ↗
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/48e7acf2-61d4-4762-8657-0701910ce69b?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/instawp-connect/tags/0.0.9.18/includes/class-instawp-rest-apis.php#L103 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/2942363/instawp-connect#file5

Credits

István Márton