Description
The WP Duplicate plugin for WordPress is vulnerable to Missing Authorization leading to Arbitrary File Upload in all versions up to and including 1.1.8. This is due to a missing capability check on the `process_add_site()` AJAX action combined with path traversal in the file upload functionality. This makes it possible for authenticated (subscriber-level) attackers to set the internal `prod_key_random_id` option, which can then be used by an unauthenticated attacker to bypass authentication checks and write arbitrary files to the server via the `handle_upload_single_big_file()` function, ultimately leading to remote code execution.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Mon, 09 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Fri, 06 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Feb 2026 08:45:00 +0000
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-02-06T17:10:58.496Z
Reserved: 2026-01-27T17:54:40.763Z
Link: CVE-2026-1499
Updated: 2026-02-06T17:10:52.422Z
Status : Awaiting Analysis
Published: 2026-02-06T09:15:48.987
Modified: 2026-02-06T15:14:47.703
Link: CVE-2026-1499
No data.
OpenCVE Enrichment
Updated: 2026-02-09T10:52:51Z
Weaknesses