CVE-2019-25314
Awaiting Analysis Awaiting Analysis - Queue
Persistent XSS in Duplicate-Post WordPress Plugin 3.2.3 Settings

Publication date: 2026-02-11

Last updated on: 2026-02-13

Assigner: VulnCheck

Description
Yoast Duplicate-Post WordPress Plugin 3.2.3 contains a persistent cross-site scripting vulnerability in plugin settings parameters. Attackers can inject malicious scripts into title prefix, suffix, menu order, and blacklist fields to execute arbitrary JavaScript in admin interfaces.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-11
Last Modified
2026-02-13
Generated
2026-05-07
AI Q&A
2026-02-11
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
yoast duplicate_post 3.2.3
yoast duplicate_post to 3.2.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2019-25314 is a persistent cross-site scripting (XSS) vulnerability in the Duplicate-Post WordPress Plugin version 3.2.3. It occurs because the plugin does not properly validate user input in certain settings fields such as title prefix, title suffix, menu order, and blacklist.'}, {'type': 'paragraph', 'content': "Attackers can inject malicious JavaScript code into these fields via the plugin's settings page. Once saved, the malicious scripts are stored persistently and executed in the context of the WordPress admin interface whenever those settings are rendered."}, {'type': 'paragraph', 'content': "This allows arbitrary script execution within the administrator's browser, which can lead to further attacks such as session hijacking or privilege escalation."}] [3, 4]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to execute arbitrary JavaScript code persistently within the WordPress admin interface.

  • Attackers can hijack administrator sessions.
  • It can lead to privilege escalation.
  • Malicious scripts can compromise site management and security.
  • The vulnerability affects confidentiality, integrity, and availability of the system to a limited extent.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by checking if the Duplicate-Post WordPress plugin version 3.2.3 or earlier is installed and if the plugin settings parameters (title prefix, suffix, menu order, blacklist fields) contain suspicious or injected JavaScript code.'}, {'type': 'paragraph', 'content': 'A practical detection method involves inspecting the plugin\'s settings page for malicious script payloads such as `"><script>alert(1)</script>` in the vulnerable fields.'}, {'type': 'paragraph', 'content': 'An example command to test for the vulnerability is to send an HTTP POST request to the WordPress admin options endpoint with payloads in the vulnerable parameters. For instance, using curl on a system with access to the WordPress admin session:'}, {'type': 'list_item', 'content': 'curl -X POST -d "option_page=duplicate_post&duplicate_post_title_prefix=\\"><script>alert(1)</script>&duplicate_post_title_suffix=\\"><script>alert(1)</script>&duplicate_post_increase_menu_order_by=\\"><script>alert(1)</script>&duplicate_post_blacklist=\\"><script>alert(1)</script>" https://yourwordpresssite.com/wp-admin/options.php --cookie "wordpress_logged_in=your_session_cookie"'}, {'type': 'paragraph', 'content': 'If the payload executes in the admin interface or is stored and reflected, the vulnerability is present.'}] [3, 4]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the Duplicate-Post WordPress plugin to a version later than 3.2.3 where the vulnerability is fixed.

If an update is not immediately possible, restrict access to the WordPress admin interface to trusted users only and avoid using the vulnerable plugin settings fields.

Additionally, monitor and sanitize inputs in the plugin settings to prevent malicious script injection.

Consider disabling or uninstalling the Duplicate-Post plugin temporarily until a secure version is installed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart