PRIOn Logo

CVE-2024-6397 Cross site request forgery (csrf)

Remediate Within one Month

CVE Information

Original CVE data


The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, This is due to insufficient verification of the API key. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username, and to perform a variety of other administrative tasks. NOTE: This vulnerability was partially fixed in, but was still exploitable via Cross-Site Request Forgery.

CWE: CWE-287
CVSS v2-
CVSS v39.8
Affected Vendors

Instawp - (1)

Basic Analysis

Common vulnerability metrics

Vulnerabilty type as detected by PRIOnengine

Cross site request forgery (csrf)

CVSS Scores as calculated by PRIOnengine
CVSS v27.5
CVSS v39.8

Vulnerability weakness type is in the top 25 CWEs according to MITRE. View Mitre Top 25 CWEs


No exploit code is reported to exist.

Active Exploitation

Vulnerability is not in CISA's Known Exploited Vulnerabilities (KEV) catalog. See the KEV Catalog

Social Network Activity


Threat Actor Activity

No sightings of the vulnerability within threat reports.

Cybersecurity Frameworks

How the vulnerability maps against various cybersecurity frameworks

T1566.002 - Phishing (Spearphishing Link)
T1566 - Phishing
T1565 - Data Manipulation
T1204.001 - User Execution (Malicious Link)
T1190 - Exploit Public-Facing Application
T1133 - External Remote Services
T1119 - Automated Collection

Compliance Impact

How the submited vulnerability affects compliance

PCI DSS v3.2.1-6.5.9 - Cross Site Request Forgery
PCI DSS v3.2.1-6.5.10 - Broken Authentication & Session Management

Web Application Security Frameworks

Applicable if the issue likely affects a web application

WASC-9 - Cross Site Request Forgery