CVE-2026-1499

WP Duplicate · WP Duplicate Plugin

The WP Duplicate plugin for WordPress allows authenticated subscribers to trigger a chain of vulnerabilities leading to unauthenticated remote code execution via arbitrary file upload.

Executive summary

A critical vulnerability chain in the WP Duplicate plugin allows authenticated users to bypass security checks, enabling unauthenticated attackers to upload malicious files and execute code remotely.

Vulnerability

This is a multi-stage flaw involving missing authorization on the process_add_site() AJAX action and path traversal. A subscriber-level attacker can set an internal key, which an unauthenticated attacker can subsequently use to bypass checks in the handle_upload_single_big_file() function, resulting in arbitrary file upload and remote code execution (RCE).

Business impact

The impact is severe, as it allows low-privileged users to facilitate a full server compromise by unauthenticated external actors. This can lead to website defacement, data exfiltration, or the use of the server as a pivot point for further internal network attacks. The CVSS score of 9.8 is justified by the ease of moving from low-level access to full RCE.

Remediation

Immediate Action: Deactivate and remove the WP Duplicate plugin immediately until a version higher than 1.1.8 is available and verified to contain the fix.

Proactive Monitoring: Review WordPress AJAX logs and check the /wp-content/uploads/ directory for suspicious PHP files or unexpected directory structures.

Compensating Controls: Implement a WAF to block unauthorized AJAX calls and restrict file upload types at the web server level.

Exploitation status

Public Exploit Available: No

Analyst recommendation

The complexity of this vulnerability chain does not diminish its risk; rather, it highlights a fundamental failure in the plugin's authorization logic. Organizations running WordPress should immediately update or remove this plugin. Given the potential for unauthenticated RCE, this is a critical priority for any web-facing WordPress installation.