CrowdSec
6/10CrowdSec Score

InstaWP Connect - Path Traversal (CVE-2025-2636)

Published on11-04-2025
First seen on25-06-2025

338Exploiting IPs reported

The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 0.1.0.85 via the 'instawp-database-manager' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.

CrowdSec analysis

CVE-2025-2636 is a critical path traversal vulnerability in the InstaWP Connect – 1-click WP Staging & Migration WordPress plugin, affecting all versions up to 0.1.0.85. This flaw allows unauthenticated attackers to exploit the 'instawp-database-manager' parameter to include and execute arbitrary files on the server, potentially leading to remote code execution, data theft, or bypassing access controls. Attackers could leverage this vulnerability to upload and execute malicious PHP code, putting affected WordPress sites at significant risk.

CrowdSec has been tracking this vulnerability and its exploits since 17th of June 2025.

According to CrowdSec data, while opportunistic exploitation dominates, a portion of threat actors trying to exploit CVE-2025-2636 apply basic targeting methods such as port or service detection. This indicates emerging patterns of selective targeting. CrowdSec data also reveals a clear uptick in attacks involving CVE-2025-2636 over the past week. Activity is above the usual baseline, suggesting growing attention from attackers. This may reflect rising awareness, recent exploit releases, or expanded targeting efforts.

Attackers exploit this vulnerability by sending filesystem-paths to any url using the instawp-database-manager parameter, leading to Local File Inclusion exploits.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.