Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13404: CWE-862 Missing Authorization in docjojo atec Duplicate Page & Post

0
Medium
VulnerabilityCVE-2025-13404cvecve-2025-13404cwe-862
Published: Tue Nov 25 2025 (11/25/2025, 07:28:23 UTC)
Source: CVE Database V5
Vendor/Project: docjojo
Product: atec Duplicate Page & Post

Description

CVE-2025-13404 is a medium-severity vulnerability in the docjojo atec Duplicate Page & Post WordPress plugin, affecting all versions up to 1. 2. 20. The flaw arises from missing authorization checks in the duplicate_post() function, allowing authenticated users with Contributor-level access or higher to duplicate arbitrary posts, including private and password-protected content. This can lead to unauthorized data exposure without impacting data integrity or availability. Exploitation requires authentication but no user interaction beyond login, and no known exploits are currently in the wild. The vulnerability primarily threatens confidentiality by exposing sensitive content through duplication. European organizations using WordPress sites with this plugin installed are at risk, especially those with contributors who have elevated privileges. Mitigation involves promptly updating the plugin once a patch is released, restricting contributor permissions, and monitoring for unusual duplication activity. Countries with high WordPress adoption and significant digital content management, such as Germany, the UK, France, and the Netherlands, are most likely to be affected.

AI-Powered Analysis

AILast updated: 12/02/2025, 14:48:58 UTC

Technical Analysis

CVE-2025-13404 identifies a missing authorization vulnerability (CWE-862) in the docjojo atec Duplicate Page & Post WordPress plugin, versions up to and including 1.2.20. The vulnerability exists in the duplicate_post() function, which lacks proper authorization validation, allowing any authenticated user with Contributor-level access or higher to duplicate posts arbitrarily. This includes posts that are private or password-protected, which should normally be restricted. The exploit does not require elevated privileges beyond Contributor, nor does it require user interaction beyond authentication. The vulnerability does not affect the integrity or availability of the posts but compromises confidentiality by exposing sensitive content through duplication. The CVSS 3.1 base score is 5.3 (medium), reflecting network attack vector, low attack complexity, no privileges required beyond Contributor, no user interaction, and limited confidentiality impact. No patches were available at the time of disclosure, and no known exploits have been observed in the wild. The vulnerability is significant because WordPress is widely used across Europe, and many organizations rely on plugins like atec Duplicate Page & Post for content management. Attackers could leverage this flaw to access sensitive internal content, potentially leading to information leakage and reputational damage.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized data exposure, particularly for websites that manage sensitive or confidential content via WordPress. Contributors or other authenticated users with moderate privileges could duplicate and access private or password-protected posts, bypassing intended access controls. This could lead to leakage of intellectual property, internal communications, or personal data protected under GDPR, resulting in compliance violations and potential fines. While the vulnerability does not allow modification or deletion of content, the confidentiality breach alone can damage trust and brand reputation. Organizations with multi-author WordPress sites, such as media companies, educational institutions, and government agencies, are especially vulnerable. The risk is amplified in environments where contributor roles are broadly assigned or where internal controls on user permissions are lax. Additionally, the lack of known exploits in the wild suggests that proactive mitigation can effectively reduce risk before widespread exploitation occurs.

Mitigation Recommendations

1. Monitor the docjojo plugin repository and official channels for the release of a security patch addressing CVE-2025-13404 and apply updates immediately upon availability. 2. Until a patch is released, restrict Contributor-level permissions by limiting the number of users assigned this role and reviewing their necessity. 3. Implement strict role-based access controls (RBAC) to ensure users only have the minimum permissions required for their tasks. 4. Use WordPress security plugins that can monitor and alert on unusual duplication or content access activities. 5. Conduct regular audits of user roles and permissions to identify and remediate excessive privileges. 6. Consider temporarily disabling or replacing the atec Duplicate Page & Post plugin if the risk is unacceptable and no patch is available. 7. Educate content managers and contributors about the risks of unauthorized duplication and encourage reporting of suspicious activity. 8. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the duplicate_post() function if feasible. 9. Ensure logging and monitoring systems capture relevant events to support incident response if exploitation is suspected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-19T14:03:17.383Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69255e28292ce6fc00be0625

Added to database: 11/25/2025, 7:43:36 AM

Last enriched: 12/2/2025, 2:48:58 PM

Last updated: 12/4/2025, 2:28:23 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats