CVE-2019-25314
Persistent XSS in Duplicate-Post WordPress Plugin 3.2.3 Settings
Publication date: 2026-02-11
Last updated on: 2026-02-13
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| yoast | duplicate_post | 3.2.3 |
| yoast | duplicate_post | to 3.2.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2019-25314 is a persistent cross-site scripting (XSS) vulnerability in the Duplicate-Post WordPress Plugin version 3.2.3. It occurs because the plugin does not properly validate user input in certain settings fields such as title prefix, title suffix, menu order, and blacklist.'}, {'type': 'paragraph', 'content': "Attackers can inject malicious JavaScript code into these fields via the plugin's settings page. Once saved, the malicious scripts are stored persistently and executed in the context of the WordPress admin interface whenever those settings are rendered."}, {'type': 'paragraph', 'content': "This allows arbitrary script execution within the administrator's browser, which can lead to further attacks such as session hijacking or privilege escalation."}] [3, 4]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing attackers to execute arbitrary JavaScript code persistently within the WordPress admin interface.
- Attackers can hijack administrator sessions.
- It can lead to privilege escalation.
- Malicious scripts can compromise site management and security.
- The vulnerability affects confidentiality, integrity, and availability of the system to a limited extent.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by checking if the Duplicate-Post WordPress plugin version 3.2.3 or earlier is installed and if the plugin settings parameters (title prefix, suffix, menu order, blacklist fields) contain suspicious or injected JavaScript code.'}, {'type': 'paragraph', 'content': 'A practical detection method involves inspecting the plugin\'s settings page for malicious script payloads such as `"><script>alert(1)</script>` in the vulnerable fields.'}, {'type': 'paragraph', 'content': 'An example command to test for the vulnerability is to send an HTTP POST request to the WordPress admin options endpoint with payloads in the vulnerable parameters. For instance, using curl on a system with access to the WordPress admin session:'}, {'type': 'list_item', 'content': 'curl -X POST -d "option_page=duplicate_post&duplicate_post_title_prefix=\\"><script>alert(1)</script>&duplicate_post_title_suffix=\\"><script>alert(1)</script>&duplicate_post_increase_menu_order_by=\\"><script>alert(1)</script>&duplicate_post_blacklist=\\"><script>alert(1)</script>" https://yourwordpresssite.com/wp-admin/options.php --cookie "wordpress_logged_in=your_session_cookie"'}, {'type': 'paragraph', 'content': 'If the payload executes in the admin interface or is stored and reflected, the vulnerability is present.'}] [3, 4]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the Duplicate-Post WordPress plugin to a version later than 3.2.3 where the vulnerability is fixed.
If an update is not immediately possible, restrict access to the WordPress admin interface to trusted users only and avoid using the vulnerable plugin settings fields.
Additionally, monitor and sanitize inputs in the plugin settings to prevent malicious script injection.
Consider disabling or uninstalling the Duplicate-Post plugin temporarily until a secure version is installed.