CVE-2024-12472: CWE-639 Authorization Bypass Through User-Controlled Key in metaphorcreations Post Duplicator
CVE-2024-12472 is a medium severity vulnerability in the WordPress Post Duplicator plugin by metaphorcreations, affecting all versions up to 2. 36. It allows authenticated users with Contributor-level access or higher to bypass authorization controls and duplicate posts they should not access, including password-protected, private, or draft posts. This results in unauthorized information exposure without impacting integrity or availability. Exploitation requires no user interaction beyond authentication and can be performed remotely. There are no known exploits in the wild yet, and no patches have been released at the time of this report. Organizations using this plugin should restrict Contributor-level access and monitor for suspicious duplication activity. The vulnerability primarily affects WordPress sites using this plugin, which are widespread globally, with higher risk in countries with large WordPress user bases. The CVSS score is 5. 3, reflecting a moderate impact on confidentiality with low complexity of attack.
AI Analysis
Technical Summary
CVE-2024-12472 is an authorization bypass vulnerability categorized under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the Post Duplicator plugin for WordPress, developed by metaphorcreations. The vulnerability exists in the mtphr_duplicate_post() function, which insufficiently restricts which posts can be duplicated. Authenticated users with Contributor-level permissions or higher can exploit this flaw to duplicate posts they normally cannot access, including password-protected, private, or draft posts. This duplication process exposes the content of these restricted posts, leading to unauthorized information disclosure. The vulnerability affects all versions of the plugin up to and including version 2.36. The attack vector is network-based and requires authentication but no user interaction beyond that. The CVSS 3.1 base score is 5.3, indicating a medium severity level, with the main impact on confidentiality (C:L), no impact on integrity (I:N), and no impact on availability (A:N). No patches or fixes have been published at the time of disclosure, and no known exploits have been observed in the wild. The vulnerability highlights a failure in access control mechanisms within the plugin, allowing privilege escalation in terms of data access. This can be leveraged by malicious insiders or compromised accounts with Contributor or higher roles to extract sensitive content from WordPress sites.
Potential Impact
The primary impact of CVE-2024-12472 is unauthorized disclosure of sensitive content from WordPress sites using the Post Duplicator plugin. Attackers with Contributor-level access can access and duplicate posts that are meant to be restricted, such as drafts, private posts, or password-protected content. This can lead to leakage of confidential business information, unpublished content, or sensitive user data. Although the vulnerability does not affect data integrity or site availability, the exposure of confidential information can have reputational, legal, and operational consequences for organizations. Since WordPress powers a significant portion of websites globally, and the Post Duplicator plugin is used by many, the scope of affected systems is potentially large. The ease of exploitation is relatively low complexity, requiring only authenticated access at Contributor level or above, which is a common role in many WordPress installations. This increases the risk especially in environments with weak user management or compromised contributor accounts. The lack of known exploits in the wild currently limits immediate widespread impact, but the vulnerability remains a significant risk until patched.
Mitigation Recommendations
To mitigate CVE-2024-12472, organizations should immediately review and restrict Contributor-level and higher user permissions to trusted individuals only, minimizing the number of users with such access. Implement strict user account management and monitoring to detect unusual duplication activity or access patterns. Disable or remove the Post Duplicator plugin if it is not essential to reduce attack surface. If the plugin is required, monitor the vendor’s announcements closely for patches or updates addressing this vulnerability and apply them promptly once available. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious duplication requests targeting the mtphr_duplicate_post() function. Additionally, consider implementing content access logging to audit attempts to duplicate or access restricted posts. Educate site administrators about the risks of excessive permissions and encourage regular reviews of user roles and capabilities. Finally, consider isolating sensitive content in separate environments or with additional access controls beyond WordPress roles to reduce exposure risk.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2024-12472: CWE-639 Authorization Bypass Through User-Controlled Key in metaphorcreations Post Duplicator
Description
CVE-2024-12472 is a medium severity vulnerability in the WordPress Post Duplicator plugin by metaphorcreations, affecting all versions up to 2. 36. It allows authenticated users with Contributor-level access or higher to bypass authorization controls and duplicate posts they should not access, including password-protected, private, or draft posts. This results in unauthorized information exposure without impacting integrity or availability. Exploitation requires no user interaction beyond authentication and can be performed remotely. There are no known exploits in the wild yet, and no patches have been released at the time of this report. Organizations using this plugin should restrict Contributor-level access and monitor for suspicious duplication activity. The vulnerability primarily affects WordPress sites using this plugin, which are widespread globally, with higher risk in countries with large WordPress user bases. The CVSS score is 5. 3, reflecting a moderate impact on confidentiality with low complexity of attack.
AI-Powered Analysis
Technical Analysis
CVE-2024-12472 is an authorization bypass vulnerability categorized under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the Post Duplicator plugin for WordPress, developed by metaphorcreations. The vulnerability exists in the mtphr_duplicate_post() function, which insufficiently restricts which posts can be duplicated. Authenticated users with Contributor-level permissions or higher can exploit this flaw to duplicate posts they normally cannot access, including password-protected, private, or draft posts. This duplication process exposes the content of these restricted posts, leading to unauthorized information disclosure. The vulnerability affects all versions of the plugin up to and including version 2.36. The attack vector is network-based and requires authentication but no user interaction beyond that. The CVSS 3.1 base score is 5.3, indicating a medium severity level, with the main impact on confidentiality (C:L), no impact on integrity (I:N), and no impact on availability (A:N). No patches or fixes have been published at the time of disclosure, and no known exploits have been observed in the wild. The vulnerability highlights a failure in access control mechanisms within the plugin, allowing privilege escalation in terms of data access. This can be leveraged by malicious insiders or compromised accounts with Contributor or higher roles to extract sensitive content from WordPress sites.
Potential Impact
The primary impact of CVE-2024-12472 is unauthorized disclosure of sensitive content from WordPress sites using the Post Duplicator plugin. Attackers with Contributor-level access can access and duplicate posts that are meant to be restricted, such as drafts, private posts, or password-protected content. This can lead to leakage of confidential business information, unpublished content, or sensitive user data. Although the vulnerability does not affect data integrity or site availability, the exposure of confidential information can have reputational, legal, and operational consequences for organizations. Since WordPress powers a significant portion of websites globally, and the Post Duplicator plugin is used by many, the scope of affected systems is potentially large. The ease of exploitation is relatively low complexity, requiring only authenticated access at Contributor level or above, which is a common role in many WordPress installations. This increases the risk especially in environments with weak user management or compromised contributor accounts. The lack of known exploits in the wild currently limits immediate widespread impact, but the vulnerability remains a significant risk until patched.
Mitigation Recommendations
To mitigate CVE-2024-12472, organizations should immediately review and restrict Contributor-level and higher user permissions to trusted individuals only, minimizing the number of users with such access. Implement strict user account management and monitoring to detect unusual duplication activity or access patterns. Disable or remove the Post Duplicator plugin if it is not essential to reduce attack surface. If the plugin is required, monitor the vendor’s announcements closely for patches or updates addressing this vulnerability and apply them promptly once available. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious duplication requests targeting the mtphr_duplicate_post() function. Additionally, consider implementing content access logging to audit attempts to duplicate or access restricted posts. Educate site administrators about the risks of excessive permissions and encourage regular reviews of user roles and capabilities. Finally, consider isolating sensitive content in separate environments or with additional access controls beyond WordPress roles to reduce exposure risk.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-10T22:47:37.270Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e3eb7ef31ef0b59b89e
Added to database: 2/25/2026, 9:48:46 PM
Last enriched: 2/26/2026, 4:27:28 AM
Last updated: 2/26/2026, 7:39:11 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.