CVE-2024-13468: CWE-862 Missing Authorization in solwininfotech Trash Duplicate and 301 Redirect
CVE-2024-13468 is a high-severity vulnerability in the WordPress plugin 'Trash Duplicate and 301 Redirect' by solwininfotech. It arises from a missing authorization check on the 'duplicates-action-top' action, allowing unauthenticated attackers to delete arbitrary posts or pages. This vulnerability affects all versions up to and including 1. 9 of the plugin. Exploitation requires no authentication or user interaction, making it highly accessible to attackers. While no known exploits are currently reported in the wild, the potential for data loss and content disruption is significant. The vulnerability impacts the integrity of website content but does not affect confidentiality or availability directly. Organizations using this plugin on WordPress sites are at risk of unauthorized content deletion, which can disrupt business operations and damage reputation. Immediate mitigation involves removing or disabling the vulnerable plugin until a patch is available or implementing strict access controls at the web server or application firewall level. Countries with large WordPress user bases and significant web presence, such as the United States, India, Brazil, Germany, and the United Kingdom, are most likely to be affected.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2024-13468 affects the 'Trash Duplicate and 301 Redirect' WordPress plugin developed by solwininfotech. The root cause is a missing authorization check (CWE-862) on the 'duplicates-action-top' action, which is responsible for handling duplicate content management and redirection tasks within the plugin. Because this action lacks proper capability verification, unauthenticated attackers can invoke it to delete arbitrary posts or pages on the affected WordPress site. This deletion capability directly compromises the integrity of website content, potentially leading to significant data loss. The vulnerability affects all versions of the plugin up to and including version 1.9. The CVSS 3.1 base score is 7.5, reflecting a high severity due to the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and no availability impact (A:N). Although no public exploits have been reported yet, the ease of exploitation and the critical nature of content deletion make this a serious threat for WordPress sites using this plugin. The vulnerability was reserved in January 2025 and published in February 2025, but no patches have been released at the time of this report.
Potential Impact
The primary impact of CVE-2024-13468 is unauthorized deletion of posts and pages, which compromises the integrity of website content. This can lead to significant operational disruption for organizations relying on WordPress for content management, including loss of critical business information, customer-facing content, and SEO rankings. The lack of authentication requirements means attackers can exploit this vulnerability remotely without any credentials, increasing the risk of widespread abuse. Although availability and confidentiality are not directly affected, the loss of data integrity can indirectly impact business continuity and trustworthiness of the affected websites. Organizations may face reputational damage, loss of user trust, and potential financial losses due to downtime or recovery efforts. The vulnerability is particularly impactful for websites that do not have frequent backups or robust content recovery mechanisms. Given WordPress's global popularity, the scope of affected systems is broad, especially for sites that have installed this specific plugin.
Mitigation Recommendations
1. Immediately disable or uninstall the 'Trash Duplicate and 301 Redirect' plugin until an official patch or update is released by solwininfotech. 2. If disabling the plugin is not feasible, restrict access to the WordPress admin area and plugin endpoints using web application firewalls (WAFs) or IP whitelisting to prevent unauthenticated access to the vulnerable action. 3. Implement strict role-based access controls within WordPress to limit plugin management capabilities to trusted administrators only. 4. Regularly back up WordPress site content and databases to enable rapid recovery in case of unauthorized deletions. 5. Monitor WordPress logs and web server logs for unusual POST requests or activity targeting the 'duplicates-action-top' action. 6. Stay informed about updates from the plugin vendor and apply patches promptly once available. 7. Consider using alternative plugins with better security track records if the plugin remains unpatched for an extended period. 8. Employ security plugins that can detect and block unauthorized content deletion attempts or suspicious administrative actions.
Affected Countries
United States, India, Brazil, Germany, United Kingdom, Canada, Australia, France, Italy, Spain
CVE-2024-13468: CWE-862 Missing Authorization in solwininfotech Trash Duplicate and 301 Redirect
Description
CVE-2024-13468 is a high-severity vulnerability in the WordPress plugin 'Trash Duplicate and 301 Redirect' by solwininfotech. It arises from a missing authorization check on the 'duplicates-action-top' action, allowing unauthenticated attackers to delete arbitrary posts or pages. This vulnerability affects all versions up to and including 1. 9 of the plugin. Exploitation requires no authentication or user interaction, making it highly accessible to attackers. While no known exploits are currently reported in the wild, the potential for data loss and content disruption is significant. The vulnerability impacts the integrity of website content but does not affect confidentiality or availability directly. Organizations using this plugin on WordPress sites are at risk of unauthorized content deletion, which can disrupt business operations and damage reputation. Immediate mitigation involves removing or disabling the vulnerable plugin until a patch is available or implementing strict access controls at the web server or application firewall level. Countries with large WordPress user bases and significant web presence, such as the United States, India, Brazil, Germany, and the United Kingdom, are most likely to be affected.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2024-13468 affects the 'Trash Duplicate and 301 Redirect' WordPress plugin developed by solwininfotech. The root cause is a missing authorization check (CWE-862) on the 'duplicates-action-top' action, which is responsible for handling duplicate content management and redirection tasks within the plugin. Because this action lacks proper capability verification, unauthenticated attackers can invoke it to delete arbitrary posts or pages on the affected WordPress site. This deletion capability directly compromises the integrity of website content, potentially leading to significant data loss. The vulnerability affects all versions of the plugin up to and including version 1.9. The CVSS 3.1 base score is 7.5, reflecting a high severity due to the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and no availability impact (A:N). Although no public exploits have been reported yet, the ease of exploitation and the critical nature of content deletion make this a serious threat for WordPress sites using this plugin. The vulnerability was reserved in January 2025 and published in February 2025, but no patches have been released at the time of this report.
Potential Impact
The primary impact of CVE-2024-13468 is unauthorized deletion of posts and pages, which compromises the integrity of website content. This can lead to significant operational disruption for organizations relying on WordPress for content management, including loss of critical business information, customer-facing content, and SEO rankings. The lack of authentication requirements means attackers can exploit this vulnerability remotely without any credentials, increasing the risk of widespread abuse. Although availability and confidentiality are not directly affected, the loss of data integrity can indirectly impact business continuity and trustworthiness of the affected websites. Organizations may face reputational damage, loss of user trust, and potential financial losses due to downtime or recovery efforts. The vulnerability is particularly impactful for websites that do not have frequent backups or robust content recovery mechanisms. Given WordPress's global popularity, the scope of affected systems is broad, especially for sites that have installed this specific plugin.
Mitigation Recommendations
1. Immediately disable or uninstall the 'Trash Duplicate and 301 Redirect' plugin until an official patch or update is released by solwininfotech. 2. If disabling the plugin is not feasible, restrict access to the WordPress admin area and plugin endpoints using web application firewalls (WAFs) or IP whitelisting to prevent unauthenticated access to the vulnerable action. 3. Implement strict role-based access controls within WordPress to limit plugin management capabilities to trusted administrators only. 4. Regularly back up WordPress site content and databases to enable rapid recovery in case of unauthorized deletions. 5. Monitor WordPress logs and web server logs for unusual POST requests or activity targeting the 'duplicates-action-top' action. 6. Stay informed about updates from the plugin vendor and apply patches promptly once available. 7. Consider using alternative plugins with better security track records if the plugin remains unpatched for an extended period. 8. Employ security plugins that can detect and block unauthorized content deletion attempts or suspicious administrative actions.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-16T15:47:36.339Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e59b7ef31ef0b59ec0e
Added to database: 2/25/2026, 9:49:13 PM
Last enriched: 2/26/2026, 12:43:29 AM
Last updated: 2/26/2026, 8:03:10 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.