Home

Description

The Yoast Duplicate Post plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the clone_bulk_action_handler() and republish_request() functions in all versions up to, and including, 4.5. This makes it possible for authenticated attackers, with Contributor-level access and above, to duplicate any post on the site including private, draft, and trashed posts they shouldn't have access to. Additionally, attackers with Author-level access and above can use the Rewrite & Republish feature to overwrite any published post with their own content.

PUBLISHED Reserved 2026-01-19 | Published 2026-03-18 | Updated 2026-04-08 | Assigner Wordfence




MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Problem types

CWE-862 Missing Authorization

Product status

Default status
unaffected

Any version
affected

Timeline

2026-01-07:Discovered
2026-03-17:Disclosed

Credits

JohSka finder

References

www.wordfence.com/...-08a9-4199-948c-5bd8b3caaa39?source=cve

plugins.trac.wordpress.org/.../src/handlers/bulk-handler.php

plugins.trac.wordpress.org/...s/4.5/src/post-republisher.php

cve.org (CVE-2026-1217)

nvd.nist.gov (CVE-2026-1217)

Download JSON