Trending

Critical WordPress Plugin Flaw Exposes Sites to File Inclusion Attacks

Listen to this article

A critical security flaw has been uncovered in the widely-used InstaWP Connect WordPress plugin, putting thousands of websites at risk of remote exploitation.

Researchers at Wordfence identified the vulnerability, tracked as CVE-2025-2636, which enables unauthenticated attackers to execute arbitrary code on vulnerable websites. The flaw has been assigned a CVSS score of 9.8, indicating maximum severity, and immediate updates are strongly recommended for all users.

InstaWP Connect Plugin – LFI Vulnerability Overview

This Local File Inclusion (LFI) vulnerability impacts all versions up to and including 0.1.0.85 of the InstaWP Connect plugin. The flaw originates in the plugin’s database management component, specifically through improper input validation on the instawp-database-manager parameter.

Technically classified as CWE-73: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’), the issue allows remote attackers to include and execute arbitrary files on the server — all without authentication.

InstaWP Connect is a companion plugin designed to integrate WordPress sites with the InstaWP platform for staging, development, and migration purposes. However, the plugin fails to adequately sanitize user input before passing it to PHP functions, creating a severe attack surface.

Discovered by security researcher Cheng Liu, the vulnerability can be exploited via a crafted HTTP request that triggers the LFI condition, potentially resulting in full server compromise. Key risks include:

  • No authentication required
  • Remote exploitability
  • Potential full server control

Administrators are urged to patch immediately to prevent exploitation.

The summary of the vulnerability is given below:

Risk FactorsDetails
Affected ProductsInstaWP Connect Plugin for WordPress (versions <= 0.1.0.85)
Impact– Include and execute arbitrary PHP files- Bypass access controls- Obtain sensitive data- Achieve code execution
Exploit PrerequisitesNo authentication required; remote exploitation possible
CVSS 3.1 Score9.8 (Critical)

Impact on WordPress Sites

This vulnerability poses a serious threat, enabling attackers to bypass access controls, extract sensitive information such as database credentials, and execute arbitrary code on the server.

In environments where file uploads are allowed—even for seemingly harmless file types like images—attackers could upload PHP payloads disguised as legitimate files, then leverage the LFI flaw to trigger their execution.

According to intelligence from VulDB, the estimated exploit price ranges from $0 to $5,000, suggesting a relatively low barrier to exploitation.

The CVSS v3.1 vector confirms that the attack is network-based, requires low complexity, and demands no privileges or user interaction, making it highly accessible to attackers.

Website administrators using InstaWP Connect are strongly advised to upgrade to version 0.1.0.86 or later, which addresses this vulnerability. If an immediate update is not feasible, the plugin should be temporarily deactivated until a patch can be applied.

This flaw follows a series of previous vulnerabilities in the plugin, including authentication bypass issues in versions 0.1.0.44 and 0.1.0.38, underscoring the critical need for regular plugin updates.

Security experts stress the severity of unauthenticated LFI vulnerabilities, as they may result in complete site compromise without requiring any user credentials.

To bolster protection, site owners are also urged to deploy a Web Application Firewall (WAF) as a proactive defense measure against similar attacks.

Cyberkitera is a premier cybersecurity publishing platform dedicated to providing the latest insights, expert security tips, and news across all areas of cybersecurity. Our mission is to empower individuals and businesses with knowledge to prevent cyber threats, stay informed about emerging trends, and safeguard their digital assets. From industry updates to practical advice on protecting against cyber attacks, Cyberkitera is your trusted source for staying ahead in the ever-evolving world of cybersecurity.

Post Comment