Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14001: CWE-862 Missing Authorization in ninjateam WP Duplicate Page

0
Medium
VulnerabilityCVE-2025-14001cvecve-2025-14001cwe-862
Published: Tue Jan 13 2026 (01/13/2026, 11:21:19 UTC)
Source: CVE Database V5
Vendor/Project: ninjateam
Product: WP Duplicate Page

Description

CVE-2025-14001 is a medium-severity vulnerability in the WP Duplicate Page WordPress plugin by ninjateam, affecting all versions up to 1. 8. It arises from missing authorization checks in the 'duplicateBulkHandle' and 'duplicateBulkHandleHPOS' functions, allowing authenticated users with Contributor-level access or higher to duplicate posts, pages, and WooCommerce HPOS orders regardless of role restrictions. This can lead to unauthorized data exposure and potential duplicate fulfillment of WooCommerce orders. The vulnerability does not require user interaction and can be exploited remotely with low attack complexity. While no known exploits are currently in the wild, the risk to confidentiality and integrity is notable, especially for e-commerce sites using WooCommerce. European organizations using this plugin should prioritize patching or applying compensating controls to restrict contributor capabilities and monitor order duplication activities. Countries with high WordPress and WooCommerce adoption, such as Germany, the UK, France, and the Netherlands, are most likely to be affected. The CVSS score is 5. 4, reflecting a medium severity level due to limited impact on availability and the requirement for authenticated access.

AI-Powered Analysis

AILast updated: 01/13/2026, 11:55:50 UTC

Technical Analysis

The WP Duplicate Page plugin for WordPress, developed by ninjateam, suffers from a missing authorization vulnerability identified as CVE-2025-14001. This vulnerability is classified under CWE-862 (Missing Authorization) and affects all plugin versions up to and including 1.8. The root cause lies in the absence of proper capability checks within the 'duplicateBulkHandle' and 'duplicateBulkHandleHPOS' functions. These functions handle bulk duplication of posts, pages, and WooCommerce High-Performance Order Storage (HPOS) orders. Due to this flaw, authenticated users with Contributor-level permissions or higher can bypass the plugin's "Allowed User Roles" restrictions and duplicate arbitrary content and orders. This unauthorized duplication can lead to exposure of sensitive information contained within posts or orders and may result in duplicate fulfillment of WooCommerce orders, causing financial and operational issues. The vulnerability requires the attacker to be authenticated but does not require user interaction, and the attack complexity is low. The CVSS 3.1 base score is 5.4, indicating medium severity, with impacts primarily on confidentiality and integrity but not availability. No public exploits have been reported yet, but the vulnerability poses a significant risk to WordPress sites using this plugin, especially those running WooCommerce with HPOS enabled.

Potential Impact

For European organizations, the vulnerability poses a risk of unauthorized data exposure and operational disruption, particularly for e-commerce businesses relying on WooCommerce. Confidentiality is impacted as attackers can access and duplicate sensitive posts, pages, and order data beyond their authorized roles. Integrity is compromised because attackers can create duplicate orders, potentially leading to financial losses, inventory mismanagement, and customer dissatisfaction. Although availability is not directly affected, the operational impact of duplicate order processing can strain resources and complicate order fulfillment workflows. Organizations with Contributor-level users or higher on their WordPress sites are at risk, especially if role restrictions are relied upon for security. The threat is more pronounced for businesses that handle sensitive customer data or have complex order fulfillment processes. Given the widespread use of WordPress and WooCommerce in Europe, this vulnerability could affect a significant number of organizations, increasing the risk of targeted abuse or accidental misuse.

Mitigation Recommendations

1. Immediately update the WP Duplicate Page plugin to a patched version once available from ninjateam. 2. Until a patch is released, restrict Contributor-level and higher user permissions to trusted personnel only, minimizing the number of users who can exploit the vulnerability. 3. Disable or limit the use of the WP Duplicate Page plugin on sites handling sensitive or critical content, especially those using WooCommerce HPOS. 4. Implement monitoring and alerting for unusual duplication activities, such as bulk duplication of posts or orders, to detect potential exploitation early. 5. Review and tighten WordPress user role assignments and capabilities to ensure least privilege principles are enforced. 6. Consider implementing Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the vulnerable plugin endpoints. 7. Conduct regular audits of WooCommerce orders to identify and remediate any duplicate or fraudulent orders promptly. 8. Educate site administrators and content managers about the risks and signs of exploitation related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-04T00:59:24.837Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69662f6ba60475309fd33d9c

Added to database: 1/13/2026, 11:41:31 AM

Last enriched: 1/13/2026, 11:55:50 AM

Last updated: 1/13/2026, 1:19:24 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats