Home

Description

The Happy Addons for Elementor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.21.0 via the `ha_duplicate_thing` admin action handler. This is due to the `can_clone()` method only checking `current_user_can('edit_posts')` (a general capability) without performing object-level authorization such as `current_user_can('edit_post', $post_id)`, and the nonce being tied to the generic action name `ha_duplicate_thing` rather than to a specific post ID. This makes it possible for authenticated attackers, with Contributor-level access and above, to clone any published post, page, or custom post type by obtaining a valid clone nonce from their own posts and changing the `post_id` parameter to target other users' content. The clone operation copies the full post content, all post metadata (including potentially sensitive widget configurations and API tokens), and taxonomies into a new draft owned by the attacker.

PUBLISHED Reserved 2026-02-20 | Published 2026-03-11 | Updated 2026-03-11 | Assigner Wordfence




MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Problem types

CWE-639 Authorization Bypass Through User-Controlled Key

Product status

Default status
unaffected

* (semver)
affected

Timeline

2026-02-20:Vendor Notified
2026-03-10:Disclosed

Credits

Dmitrii Ignatyev finder

References

www.wordfence.com/...-032f-487d-b60a-f80c78373238?source=cve

plugins.trac.wordpress.org/...20.7/classes/clone-handler.php

plugins.trac.wordpress.org/...20.7/classes/clone-handler.php

plugins.trac.wordpress.org/...runk/classes/clone-handler.php

plugins.trac.wordpress.org/...runk/classes/clone-handler.php

plugins.trac.wordpress.org/...%2Ftrunk&sfp_email=&sfph_mail=

cve.org (CVE-2026-2917)

nvd.nist.gov (CVE-2026-2917)

Download JSON