Lucene search

K
wpvulndbWpvulndbWPVDB-ID:9DB733D7-EABD-4B36-8F2D-3E9A2EBB2CF8
HistoryFeb 20, 2024 - 12:00 a.m.

InstaWP Connect < 0.1.0.9 - Authenticated (Subscriber+) Remote Code Execution

2024-02-2000:00:00
wpscan.com
9
instawp connect
wordpress
remote code execution

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

7.6 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

Description The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 0.1.0.8. This makes it possible for authenticated attackers, with subscriber-level access and above, to execute code on the server.

CPENameOperatorVersion
eq0.1.0.9

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

7.6 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

Related for WPVDB-ID:9DB733D7-EABD-4B36-8F2D-3E9A2EBB2CF8