Description
Missing Authorization vulnerability in Evan Herman Post Cloner post-cloner allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Post Cloner: from n/a through <= 1.0.0.
Published: 2025-12-09
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability in the Post Cloner plugin is a missing authorization check that allows any site visitor to invoke the plugin’s post‑cloning capability without appropriate permissions. This is a CWE-862 Missing Authorization flaw. An attacker could therefore clone existing content or create duplicate posts, potentially injecting misleading or malicious content into the site’s public‑facing areas. This flaw does not provide direct code execution, but it enables unauthorized modification of website content, undermining content integrity and potentially facilitating social engineering or defacement.

Affected Systems

The affected product is the WordPress plugin developed by Evan Herman named Post Cloner. All released versions up to and including 1.0.0 are impacted.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity, and the EPSS score of less than 1% suggests that the likelihood of real‑world exploitation is low. The vulnerability is not listed in CISA’s KEV catalog. Attackers would need to access the website’s frontend or an authenticated user’s interface to trigger the plugin’s cloning function; the likely attack vector is a network‑based interaction with the WordPress site and is inferred from the nature of the plugin functionality.

Generated by OpenCVE AI on April 29, 2026 at 13:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Post Cloner plugin to a version newer than 1.0.0 where the missing authorization flaw (CWE-862) is corrected.
  • If an upgrade is not immediately feasible, disable the plugin to block the bypassed functionality.
  • Review WordPress user roles and capabilities, ensuring that only administrators or trusted users retain permission to use post‑cloning features; this review helps verify the missing authorization issue (CWE-862) is properly enforced.

Generated by OpenCVE AI on April 29, 2026 at 13:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Wed, 10 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 10 Dec 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 09 Dec 2025 15:00:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Evan Herman Post Cloner post-cloner allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Post Cloner: from n/a through <= 1.0.0.
Title WordPress Post Cloner plugin <= 1.0.0 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T18:55:54.168Z

Reserved: 2025-10-24T07:50:53.684Z

Link: CVE-2025-62865

cve-icon Vulnrichment

Updated: 2025-12-10T21:51:24.260Z

cve-icon NVD

Status : Deferred

Published: 2025-12-09T16:18:03.523

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-62865

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T13:45:12Z

Weaknesses