### [CVE-2024-2667](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2667) ![](https://img.shields.io/static/v1?label=Product&message=InstaWP%20Connect%20%E2%80%93%201-click%20WP%20Staging%20%26%20Migration&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%200.1.0.22%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type&color=brighgreen) ### Description The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file validation in the /wp-json/instawp-connect/v1/config REST API endpoint in all versions up to, and including, 0.1.0.22. This makes it possible for unauthenticated attackers to upload arbitrary files. ### POC #### Reference No PoCs from references. #### Github - https://github.com/Nxploited/CVE-2024-2667-Poc - https://github.com/Puvipavan/CVE-2024-2667 - https://github.com/nomi-sec/PoC-in-GitHub