CVE-2026-1217
Received Received - Intake
Unauthorized Data Modification in Yoast Duplicate Post Plugin

Publication date: 2026-03-18

Last updated on: 2026-03-18

Assigner: Wordfence

Description
The Yoast Duplicate Post plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the clone_bulk_action_handler() and republish_request() functions in all versions up to, and including, 4.5. This makes it possible for authenticated attackers, with Contributor-level access and above, to duplicate any post on the site including private, draft, and trashed posts they shouldn't have access to. Additionally, attackers with Author-level access and above can use the Rewrite & Republish feature to overwrite any published post with their own content.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-18
Last Modified
2026-03-18
Generated
2026-05-07
AI Q&A
2026-03-18
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
yoast duplicate_post to 4.5 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The Yoast Duplicate Post plugin for WordPress has a vulnerability due to missing capability checks in two key functions: clone_bulk_action_handler() and republish_request(). This flaw allows authenticated users with Contributor-level access or higher to duplicate any post on the site, including private, draft, and trashed posts they normally should not access.

Additionally, users with Author-level access or higher can exploit the Rewrite & Republish feature to overwrite any published post with their own content, effectively modifying posts they do not own or control.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized duplication and modification of posts on a WordPress site using the Yoast Duplicate Post plugin. An attacker with Contributor-level access can duplicate sensitive or restricted posts, potentially exposing private or draft content.

More critically, an attacker with Author-level access can overwrite published posts with malicious or unauthorized content using the Rewrite & Republish feature, which can damage the integrity and trustworthiness of the website's content.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability involves unauthorized modification of posts via the Yoast Duplicate Post plugin for WordPress, specifically through the clone_bulk_action_handler() and republish_request() functions. Detection would involve monitoring for unusual bulk cloning or rewrite & republish actions initiated by users with Contributor-level access or higher.'}, {'type': 'paragraph', 'content': 'Since the vulnerability exploits WordPress admin bulk actions, you can detect it by auditing WordPress admin logs for bulk duplication or rewrite & republish actions, especially those performed by users with Contributor or Author roles.'}, {'type': 'paragraph', 'content': 'Suggested commands or methods include:'}, {'type': 'list_item', 'content': 'Check WordPress audit logs or activity logs for bulk actions named "duplicate_post_bulk_clone" or "duplicate_post_bulk_rewrite_republish".'}, {'type': 'list_item', 'content': 'Use WP-CLI to list recent post duplications or modifications by users with Contributor or Author roles.'}, {'type': 'list_item', 'content': 'Example WP-CLI command to list recent posts duplicated or modified (requires custom scripting or logging):'}, {'type': 'list_item', 'content': 'wp post list --post_type=post --meta_key=_dp_has_been_republished --meta_compare=EXISTS'}, {'type': 'list_item', 'content': 'Monitor HTTP requests to the WordPress admin interface for POST requests triggering bulk clone or rewrite & republish actions.'}, {'type': 'paragraph', 'content': "Note: The provided resources do not include explicit detection commands, so these suggestions are based on the plugin's behavior and typical WordPress monitoring practices."}] [1, 3]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediate steps include:

  • Update the Yoast Duplicate Post plugin to a version later than 4.5 where the missing capability checks are fixed.
  • Restrict Contributor-level and Author-level user permissions to prevent unauthorized access to duplication and rewrite & republish features.
  • Temporarily disable or restrict bulk cloning and rewrite & republish actions in the plugin settings or by removing the plugin if an update is not immediately available.
  • Monitor and audit user actions related to post duplication and republishing to detect any unauthorized activity.

These steps help prevent attackers with lower-level access from duplicating or overwriting posts they should not have access to.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart