Cyber Posture

CVE-2024-13913

High

Published: 14 March 2025

Published
14 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0010 27.3th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may backdoor web servers with web shells to establish persistent access to systems.

Security Summary

CVE-2024-13913 is a Cross-Site Request Forgery (CSRF) vulnerability, classified under CWE-352, affecting the InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress in all versions up to and including 0.1.0.83. The issue stems from missing or incorrect nonce validation in the '/migrate/templates/main.php' file, which enables unauthenticated attackers to include and execute arbitrary files on the server. This flaw allows the execution of PHP code within those files, particularly when leveraging uploads of images or other "safe" file types that can be included.

Unauthenticated attackers can exploit this vulnerability by tricking an authenticated user into performing a malicious action, such as visiting a crafted webpage, due to the requirement for user interaction (UI:R) as indicated by the CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Successful exploitation grants high-impact confidentiality, integrity, and availability effects, enabling attackers to bypass access controls, obtain sensitive data, or achieve remote code execution on the targeted WordPress server.

Mitigation details are outlined in WordPress plugin trac references, including code locations in 'class-instawp-admin.php' (line 159) and 'main.php' (line 27), with a patch applied in changeset 3254817. Security practitioners should update the InstaWP Connect plugin to a version beyond 0.1.0.83, as advised by sources like Wordfence threat intelligence, to address the nonce validation deficiency and prevent arbitrary file inclusion.

Details

CWE(s)
CWE-352

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

CSRF vuln in public-facing WordPress plugin enables direct exploitation of the application for initial access (T1190) and arbitrary PHP file inclusion for RCE, directly facilitating web shell deployment (T1505.003).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References