{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T14:58:14.198","vulnerabilities":[{"cve":{"id":"CVE-2023-3956","sourceIdentifier":"security@wordfence.com","published":"2023-07-27T07:15:09.857","lastModified":"2026-04-08T18:18:11.260","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The InstaWP Connect plugin for WordPress is vulnerable to unauthorized access of data, modification of data and loss of data due to a missing capability check on the 'events_receiver' function in versions up to, and including, 0.0.9.18. This makes it possible for unauthenticated attackers to add, modify or delete post and taxonomy, install, activate or deactivate plugin, change customizer settings, add or modify or delete user including administrator user."},{"lang":"es","value":"El plugin InstaWP Connect para WordPress es vulnerable al acceso no autorizado de datos, modificación de datos y pérdida de datos debido a una comprobación de capacidad faltante en la función \"events_receiver\" en versiones hasta la 0.0.9.18 inclusive. Esto hace posible que atacantes no autenticados añadan, modifiquen o eliminen entradas y taxonomías, instalen, activen o desactiven el plugin, cambien la configuración del personalizador y añadan, modifiquen o eliminen usuarios incluyendo el usuario administrador. "}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security@wordfence.com","type":"Primary","description":[{"lang":"en","value":"CWE-862"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:instawp:instawp_connect:*:*:*:*:*:wordpress:*:*","versionEndIncluding":"0.0.9.18","matchCriteriaId":"CA84D292-8449-4A87-8D0A-84D08318737F"}]}]}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/instawp-connect/tags/0.0.9.18/includes/class-instawp-rest-apis.php#L103","source":"security@wordfence.com","tags":["Patch"]},{"url":"https://plugins.trac.wordpress.org/changeset/2942363/instawp-connect#file5","source":"security@wordfence.com","tags":["Patch"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/48e7acf2-61d4-4762-8657-0701910ce69b?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]},{"url":"https://plugins.trac.wordpress.org/browser/instawp-connect/tags/0.0.9.18/includes/class-instawp-rest-apis.php#L103","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://plugins.trac.wordpress.org/changeset/2942363/instawp-connect#file5","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/48e7acf2-61d4-4762-8657-0701910ce69b?source=cve","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}