CVE-2026-1499
Missing Authorization in WP Duplicate Plugin Enables RCE
Publication date: 2026-02-06
Last updated on: 2026-04-08
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordfence | wp_duplicate | to 1.1.8 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The WP Duplicate plugin for WordPress has a vulnerability due to missing authorization checks on the `process_add_site()` AJAX action. This flaw allows authenticated users with subscriber-level privileges to set an internal option called `prod_key_random_id`. An unauthenticated attacker can then exploit this to bypass authentication checks and upload arbitrary files to the server using the `handle_upload_single_big_file()` function. This arbitrary file upload can ultimately lead to remote code execution on the server.
How can this vulnerability impact me? :
This vulnerability can have severe impacts including unauthorized remote code execution on your WordPress server. An attacker can upload arbitrary files, potentially malicious scripts, which can compromise the entire server environment. This can lead to data breaches, site defacement, loss of data integrity, and complete takeover of the affected WordPress site.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
[{'type': 'paragraph', 'content': 'The vulnerability in the WP Duplicate plugin for WordPress (up to version 1.1.8) is due to missing authorization checks on the `process_add_site()` AJAX action, allowing arbitrary file uploads and potential remote code execution.'}, {'type': 'paragraph', 'content': 'Immediate mitigation steps include:'}, {'type': 'list_item', 'content': 'Update the WP Duplicate plugin to a version later than 1.1.8 where the vulnerability is fixed.'}, {'type': 'list_item', 'content': 'If an update is not immediately possible, restrict access to the AJAX action `process_add_site()` to trusted users only, ensuring that only users with appropriate capabilities (e.g., administrators) can invoke it.'}, {'type': 'list_item', 'content': "Implement or verify capability checks such as `current_user_can('manage_options')` before processing site addition requests to prevent unauthorized resets or uploads."}, {'type': 'list_item', 'content': 'Sanitize and validate all inputs related to site addition and file uploads to prevent path traversal and arbitrary file writes.'}, {'type': 'paragraph', 'content': 'These steps are based on improvements noted in version 1.1.9 of the Local Sync plugin, which enhanced authorization checks and input sanitization to prevent unauthorized file uploads and resets.'}] [6]