CrowdSec
5/10CrowdSec Score

InstaWP Connect - Path Traversal (CVE-2025-2636)

Published on11-04-2025
First seen on25-06-2025

248Exploiting IPs reported

The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 0.1.0.85 via the 'instawp-database-manager' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.

CrowdSec analysis

CVE-2025-2636 is a critical path traversal vulnerability in the InstaWP Connect – 1-click WP Staging & Migration WordPress plugin, affecting all versions up to 0.1.0.85. This flaw allows unauthenticated attackers to exploit the 'instawp-database-manager' parameter to include and execute arbitrary files on the server, potentially leading to remote code execution, data theft, or bypassing access controls. Attackers could leverage this vulnerability to upload and execute malicious PHP code, putting affected WordPress sites at significant risk.

CrowdSec has been tracking this vulnerability and its exploits since 17th of June 2025.

Insights from the CrowdSec network reveal that the attackers trying to exploit CVE-2025-2636 are composed of a fairly even mix of opportunistic and targeted actors. Some attackers employ preliminary reconnaissance, while others use indiscriminate scanning. In addition, according to the CrowdSec network, attack volume against CVE-2025-2636 has dipped slightly compared to the previous week. Although still commonly targeted, the decline suggests a cooling-off period. Long-term relevance remains, but attention is waning.

Attackers exploit this vulnerability by sending filesystem-paths to any url using the instawp-database-manager parameter, leading to Local File Inclusion exploits.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.