CVE-2024-4898
InstaWP Connect – 1-click WP Staging & Migration <= 0.1.0.38 - Missing Authorization to Unauthenticated API setup/Arbitrary Options Update/Administrative User Creation
CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th
The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to arbitrary option updates due to a missing authorization checks on the REST API calls in all versions up to, and including, 0.1.0.38. This makes it possible for unauthenticated attackers to connect the site to InstaWP API, edit arbitrary site options and create administrator accounts.
| CWE | CWE-862 |
| Vendor | instawp |
| Product | instawp connect – 1-click wp staging & migration |
| Published | Jun 12, 2024 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for instawp instawp connect – 1-click wp staging & migration
Be the first to know when new critical vulnerabilities affecting instawp instawp connect – 1-click wp staging & migration are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
instawp / InstaWP Connect – 1-click WP Staging & Migration
0 ≤ 0.1.0.38
References
Credits
Truoc Phan