vulnerability
WordPress Plugin: post-duplicator: CVE-2024-12472: Authorization Bypass Through User-Controlled Key
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:L/Au:S/C:P/I:N/A:N) | Jan 10, 2025 | May 15, 2025 | Apr 29, 2026 |
Severity
4
CVSS
(AV:N/AC:L/Au:S/C:P/I:N/A:N)
Published
Jan 10, 2025
Added
May 15, 2025
Modified
Apr 29, 2026
Description
The Post Duplicator plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.36 via the mtphr_duplicate_post() function due to insufficient restrictions on which posts can be duplicated. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to by duplicating the post.
Solution
post-duplicator-plugin-cve-2024-12472
References
- https://www.cve.org/CVERecord?id=CVE-2024-12472
- https://www.wordfence.com/threat-intel/vulnerabilities/id/3071b2dc-9673-4e30-bd04-7404eb6a1ed9?source=api-prod
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2024-50884
- CVE-2024-12472
- https://attackerkb.com/topics/CVE-2024-12472
- CWE-639
- EUVD-EUVD-2024-50884
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.