CVE-2026-1499
Unknown Unknown - Not Provided
Missing Authorization in WP Duplicate Plugin Enables RCE

Publication date: 2026-02-06

Last updated on: 2026-04-08

Assigner: Wordfence

Description
The WP Duplicate plugin for WordPress is vulnerable to Missing Authorization leading to Arbitrary File Upload in all versions up to and including 1.1.8. This is due to a missing capability check on the `process_add_site()` AJAX action combined with path traversal in the file upload functionality. This makes it possible for authenticated (subscriber-level) attackers to set the internal `prod_key_random_id` option, which can then be used by an unauthenticated attacker to bypass authentication checks and write arbitrary files to the server via the `handle_upload_single_big_file()` function, ultimately leading to remote code execution.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-06
Last Modified
2026-04-08
Generated
2026-05-07
AI Q&A
2026-02-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wordfence wp_duplicate to 1.1.8 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The WP Duplicate plugin for WordPress has a vulnerability due to missing authorization checks on the `process_add_site()` AJAX action. This flaw allows authenticated users with subscriber-level privileges to set an internal option called `prod_key_random_id`. An unauthenticated attacker can then exploit this to bypass authentication checks and upload arbitrary files to the server using the `handle_upload_single_big_file()` function. This arbitrary file upload can ultimately lead to remote code execution on the server.


How can this vulnerability impact me? :

This vulnerability can have severe impacts including unauthorized remote code execution on your WordPress server. An attacker can upload arbitrary files, potentially malicious scripts, which can compromise the entire server environment. This can lead to data breaches, site defacement, loss of data integrity, and complete takeover of the affected WordPress site.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'The vulnerability in the WP Duplicate plugin for WordPress (up to version 1.1.8) is due to missing authorization checks on the `process_add_site()` AJAX action, allowing arbitrary file uploads and potential remote code execution.'}, {'type': 'paragraph', 'content': 'Immediate mitigation steps include:'}, {'type': 'list_item', 'content': 'Update the WP Duplicate plugin to a version later than 1.1.8 where the vulnerability is fixed.'}, {'type': 'list_item', 'content': 'If an update is not immediately possible, restrict access to the AJAX action `process_add_site()` to trusted users only, ensuring that only users with appropriate capabilities (e.g., administrators) can invoke it.'}, {'type': 'list_item', 'content': "Implement or verify capability checks such as `current_user_can('manage_options')` before processing site addition requests to prevent unauthorized resets or uploads."}, {'type': 'list_item', 'content': 'Sanitize and validate all inputs related to site addition and file uploads to prevent path traversal and arbitrary file writes.'}, {'type': 'paragraph', 'content': 'These steps are based on improvements noted in version 1.1.9 of the Local Sync plugin, which enhanced authorization checks and input sanitization to prevent unauthorized file uploads and resets.'}] [6]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart