Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1217: CWE-862 Missing Authorization in yoast Yoast Duplicate Post

0
Medium
VulnerabilityCVE-2026-1217cvecve-2026-1217cwe-862
Published: Wed Mar 18 2026 (03/18/2026, 09:28:28 UTC)
Source: CVE Database V5
Vendor/Project: yoast
Product: Yoast Duplicate Post

Description

The Yoast Duplicate Post plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the clone_bulk_action_handler() and republish_request() functions in all versions up to, and including, 4.5. This makes it possible for authenticated attackers, with Contributor-level access and above, to duplicate any post on the site including private, draft, and trashed posts they shouldn't have access to. Additionally, attackers with Author-level access and above can use the Rewrite & Republish feature to overwrite any published post with their own content.

AI-Powered Analysis

AILast updated: 03/18/2026, 09:57:54 UTC

Technical Analysis

The Yoast Duplicate Post plugin for WordPress suffers from a missing authorization vulnerability (CWE-862) identified as CVE-2026-1217. This vulnerability exists in all versions up to and including 4.5 due to the absence of proper capability checks in two key functions: clone_bulk_action_handler() and republish_request(). The clone_bulk_action_handler() function allows authenticated users with Contributor-level permissions or higher to duplicate posts indiscriminately, including those that are private, drafts, or trashed, which they normally should not access. The republish_request() function enables users with Author-level access or above to overwrite any published post's content using the Rewrite & Republish feature, effectively allowing unauthorized content modification. The vulnerability is remotely exploitable without user interaction and requires only low-level authenticated access, making it relatively easy to exploit within compromised or insider accounts. The CVSS 3.1 base score is 5.4 (medium), reflecting the moderate impact on confidentiality and integrity but no impact on availability. Although no public exploits have been reported, the flaw could be leveraged to manipulate website content, deface posts, or escalate privileges by altering published material, undermining trust and content integrity on affected WordPress sites.

Potential Impact

This vulnerability can significantly impact organizations relying on WordPress sites using the Yoast Duplicate Post plugin. Unauthorized duplication of private, draft, or trashed posts can lead to leakage of sensitive or unpublished content. More critically, the ability for Authors or higher to overwrite published posts can result in content defacement, misinformation, or insertion of malicious content, damaging brand reputation and user trust. Attackers could manipulate website content to conduct phishing, spread disinformation, or embed malicious links. The flaw also facilitates privilege escalation scenarios where attackers with limited access can perform actions reserved for higher privilege levels. For organizations with strict content governance or regulatory compliance requirements, this vulnerability poses risks to data integrity and confidentiality. Although availability is not directly affected, the reputational damage and potential regulatory consequences can be severe.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately update the Yoast Duplicate Post plugin to a patched version once released by the vendor. In the absence of an official patch, administrators should restrict Contributor-level and Author-level permissions to trusted users only, minimizing the risk of exploitation. Implementing strict role-based access controls and regularly auditing user permissions can reduce exposure. Additionally, monitoring logs for unusual duplication or republishing activities can help detect exploitation attempts early. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the clone_bulk_action_handler() and republish_request() endpoints can provide temporary protection. Site owners should also consider disabling the Rewrite & Republish feature if not essential. Regular backups and content integrity verification can aid in recovery if exploitation occurs. Finally, educating content managers and administrators about this vulnerability and safe plugin management practices is recommended.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-19T22:11:13.075Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ba73bc771bdb174968081d

Added to database: 3/18/2026, 9:43:24 AM

Last enriched: 3/18/2026, 9:57:54 AM

Last updated: 3/19/2026, 5:13:47 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses