CVE-2026-1499: CWE-862 Missing Authorization in revmakx WP Duplicate – WordPress Migration Plugin
The WP Duplicate plugin for WordPress is vulnerable to Missing Authorization leading to Arbitrary File Upload in all versions up to and including 1.1.8. This is due to a missing capability check on the `process_add_site()` AJAX action combined with path traversal in the file upload functionality. This makes it possible for authenticated (subscriber-level) attackers to set the internal `prod_key_random_id` option, which can then be used by an unauthenticated attacker to bypass authentication checks and write arbitrary files to the server via the `handle_upload_single_big_file()` function, ultimately leading to remote code execution.
AI Analysis
Technical Summary
The WP Duplicate – WordPress Migration Plugin suffers from a Missing Authorization vulnerability (CWE-862) identified as CVE-2026-1499. The root cause is the absence of a capability check on the `process_add_site()` AJAX action, which is accessible to authenticated users with subscriber-level privileges. This flaw allows such low-privileged users to set the internal `prod_key_random_id` option. Subsequently, an unauthenticated attacker can exploit this manipulated state to bypass authentication checks and invoke the `handle_upload_single_big_file()` function. This function contains a path traversal vulnerability in its file upload mechanism, enabling the attacker to write arbitrary files to the server. The consequence is remote code execution, allowing full compromise of the WordPress host. The vulnerability affects all versions up to and including 1.1.8 of the plugin. The CVSS 3.1 score of 9.8 reflects its critical nature, with network attack vector, no required privileges for the final exploit step, no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability’s characteristics make it a prime target for attackers once weaponized.
Potential Impact
This vulnerability poses a severe risk to organizations running WordPress sites with the WP Duplicate plugin installed. Successful exploitation leads to remote code execution, which can result in full server compromise, data theft, defacement, malware deployment, or pivoting to internal networks. The ability for low-privileged authenticated users to enable unauthenticated attackers to upload arbitrary files significantly lowers the attack barrier. This can disrupt business operations, damage reputation, and cause regulatory compliance issues due to data breaches. Given WordPress’s widespread use globally, many websites, including corporate, governmental, and e-commerce platforms, could be affected. The lack of authentication requirement for the final exploit step increases the likelihood of automated attacks and wormable scenarios. Organizations may face downtime, data loss, and costly incident response efforts if exploited.
Mitigation Recommendations
Immediate mitigation involves updating the WP Duplicate plugin to a version where this vulnerability is patched once available. Until a patch is released, organizations should restrict access to the WordPress admin area, especially limiting subscriber-level accounts from accessing AJAX endpoints related to the plugin. Implement web application firewall (WAF) rules to detect and block suspicious AJAX requests targeting `process_add_site()` and file upload functions. Disable or remove the plugin if not essential. Monitor server logs for unusual file upload activity or changes to the `prod_key_random_id` option. Employ file integrity monitoring to detect unauthorized file writes. Harden WordPress installations by enforcing least privilege principles, disabling unnecessary user roles, and restricting plugin installation to trusted administrators. Regularly back up sites and test restoration procedures to mitigate damage from potential exploitation.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2026-1499: CWE-862 Missing Authorization in revmakx WP Duplicate – WordPress Migration Plugin
Description
The WP Duplicate plugin for WordPress is vulnerable to Missing Authorization leading to Arbitrary File Upload in all versions up to and including 1.1.8. This is due to a missing capability check on the `process_add_site()` AJAX action combined with path traversal in the file upload functionality. This makes it possible for authenticated (subscriber-level) attackers to set the internal `prod_key_random_id` option, which can then be used by an unauthenticated attacker to bypass authentication checks and write arbitrary files to the server via the `handle_upload_single_big_file()` function, ultimately leading to remote code execution.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The WP Duplicate – WordPress Migration Plugin suffers from a Missing Authorization vulnerability (CWE-862) identified as CVE-2026-1499. The root cause is the absence of a capability check on the `process_add_site()` AJAX action, which is accessible to authenticated users with subscriber-level privileges. This flaw allows such low-privileged users to set the internal `prod_key_random_id` option. Subsequently, an unauthenticated attacker can exploit this manipulated state to bypass authentication checks and invoke the `handle_upload_single_big_file()` function. This function contains a path traversal vulnerability in its file upload mechanism, enabling the attacker to write arbitrary files to the server. The consequence is remote code execution, allowing full compromise of the WordPress host. The vulnerability affects all versions up to and including 1.1.8 of the plugin. The CVSS 3.1 score of 9.8 reflects its critical nature, with network attack vector, no required privileges for the final exploit step, no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability’s characteristics make it a prime target for attackers once weaponized.
Potential Impact
This vulnerability poses a severe risk to organizations running WordPress sites with the WP Duplicate plugin installed. Successful exploitation leads to remote code execution, which can result in full server compromise, data theft, defacement, malware deployment, or pivoting to internal networks. The ability for low-privileged authenticated users to enable unauthenticated attackers to upload arbitrary files significantly lowers the attack barrier. This can disrupt business operations, damage reputation, and cause regulatory compliance issues due to data breaches. Given WordPress’s widespread use globally, many websites, including corporate, governmental, and e-commerce platforms, could be affected. The lack of authentication requirement for the final exploit step increases the likelihood of automated attacks and wormable scenarios. Organizations may face downtime, data loss, and costly incident response efforts if exploited.
Mitigation Recommendations
Immediate mitigation involves updating the WP Duplicate plugin to a version where this vulnerability is patched once available. Until a patch is released, organizations should restrict access to the WordPress admin area, especially limiting subscriber-level accounts from accessing AJAX endpoints related to the plugin. Implement web application firewall (WAF) rules to detect and block suspicious AJAX requests targeting `process_add_site()` and file upload functions. Disable or remove the plugin if not essential. Monitor server logs for unusual file upload activity or changes to the `prod_key_random_id` option. Employ file integrity monitoring to detect unauthorized file writes. Harden WordPress installations by enforcing least privilege principles, disabling unnecessary user roles, and restricting plugin installation to trusted administrators. Regularly back up sites and test restoration procedures to mitigate damage from potential exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-27T17:54:40.763Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6985aa16f9fa50a62fee1475
Added to database: 2/6/2026, 8:45:10 AM
Last enriched: 2/26/2026, 7:12:04 PM
Last updated: 3/24/2026, 12:03:16 AM
Views: 121
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.