Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12472: CWE-639 Authorization Bypass Through User-Controlled Key in metaphorcreations Post Duplicator

0
Medium
VulnerabilityCVE-2024-12472cvecve-2024-12472cwe-639
Published: Sat Jan 11 2025 (01/11/2025, 02:20:53 UTC)
Source: CVE Database V5
Vendor/Project: metaphorcreations
Product: Post Duplicator

Description

CVE-2024-12472 is a medium severity vulnerability in the WordPress Post Duplicator plugin by metaphorcreations, affecting all versions up to 2. 36. It allows authenticated users with Contributor-level access or higher to bypass authorization controls and duplicate posts they should not access, including password-protected, private, or draft posts. This results in unauthorized information exposure without impacting integrity or availability. Exploitation requires no user interaction beyond authentication and can be performed remotely. There are no known exploits in the wild yet, and no patches have been released at the time of this report. Organizations using this plugin should restrict Contributor-level access and monitor for suspicious duplication activity. The vulnerability primarily affects WordPress sites using this plugin, which are widespread globally, with higher risk in countries with large WordPress user bases. The CVSS score is 5. 3, reflecting a moderate impact on confidentiality with low complexity of attack.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:27:28 UTC

Technical Analysis

CVE-2024-12472 is an authorization bypass vulnerability categorized under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the Post Duplicator plugin for WordPress, developed by metaphorcreations. The vulnerability exists in the mtphr_duplicate_post() function, which insufficiently restricts which posts can be duplicated. Authenticated users with Contributor-level permissions or higher can exploit this flaw to duplicate posts they normally cannot access, including password-protected, private, or draft posts. This duplication process exposes the content of these restricted posts, leading to unauthorized information disclosure. The vulnerability affects all versions of the plugin up to and including version 2.36. The attack vector is network-based and requires authentication but no user interaction beyond that. The CVSS 3.1 base score is 5.3, indicating a medium severity level, with the main impact on confidentiality (C:L), no impact on integrity (I:N), and no impact on availability (A:N). No patches or fixes have been published at the time of disclosure, and no known exploits have been observed in the wild. The vulnerability highlights a failure in access control mechanisms within the plugin, allowing privilege escalation in terms of data access. This can be leveraged by malicious insiders or compromised accounts with Contributor or higher roles to extract sensitive content from WordPress sites.

Potential Impact

The primary impact of CVE-2024-12472 is unauthorized disclosure of sensitive content from WordPress sites using the Post Duplicator plugin. Attackers with Contributor-level access can access and duplicate posts that are meant to be restricted, such as drafts, private posts, or password-protected content. This can lead to leakage of confidential business information, unpublished content, or sensitive user data. Although the vulnerability does not affect data integrity or site availability, the exposure of confidential information can have reputational, legal, and operational consequences for organizations. Since WordPress powers a significant portion of websites globally, and the Post Duplicator plugin is used by many, the scope of affected systems is potentially large. The ease of exploitation is relatively low complexity, requiring only authenticated access at Contributor level or above, which is a common role in many WordPress installations. This increases the risk especially in environments with weak user management or compromised contributor accounts. The lack of known exploits in the wild currently limits immediate widespread impact, but the vulnerability remains a significant risk until patched.

Mitigation Recommendations

To mitigate CVE-2024-12472, organizations should immediately review and restrict Contributor-level and higher user permissions to trusted individuals only, minimizing the number of users with such access. Implement strict user account management and monitoring to detect unusual duplication activity or access patterns. Disable or remove the Post Duplicator plugin if it is not essential to reduce attack surface. If the plugin is required, monitor the vendor’s announcements closely for patches or updates addressing this vulnerability and apply them promptly once available. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious duplication requests targeting the mtphr_duplicate_post() function. Additionally, consider implementing content access logging to audit attempts to duplicate or access restricted posts. Educate site administrators about the risks of excessive permissions and encourage regular reviews of user roles and capabilities. Finally, consider isolating sensitive content in separate environments or with additional access controls beyond WordPress roles to reduce exposure risk.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-10T22:47:37.270Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e3eb7ef31ef0b59b89e

Added to database: 2/25/2026, 9:48:46 PM

Last enriched: 2/26/2026, 4:27:28 AM

Last updated: 2/26/2026, 7:39:11 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats