Description
Missing Authorization vulnerability in Arul Prasad J WP Quick Post Duplicator wp-quick-post-duplicator allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Quick Post Duplicator: from n/a through <= 2.1.
Published: 2026-01-22
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Broken Access Control
Action: Update Plugin
AI Analysis

Impact

The WP Quick Post Duplicator plugin implements a missing authorization check that allows an attacker to invoke privileged functions without proper authentication. This flaw is rooted in incorrectly configured security levels and is identified as an authorization bypass (CWE‑862). By exploiting the vulnerability, an attacker could create, modify or delete posts, or otherwise perform any action that the plugin’s privileged functions permit, potentially compromising the integrity of the WordPress site.

Affected Systems

The issue affects the WP Quick Post Duplicator plug‑in developed by Arul Prasad J, specifically all releases from the first version through version 2.1. WordPress sites that have installed any of these versions and have the plug‑in enabled are vulnerable until the code is removed, disabled or updated to a non‑affected release.

Risk and Exploitability

The fault carries a CVSS score of 4.3, indicating moderate impact, and an EPSS score of less than 1%, meaning the likelihood of exploitation at this time is low. The vulnerability is not listed in CISA’s KEV catalog. The description implies that any user who can reach the plug‑in’s endpoints—potentially unauthenticated visitors or users with minimal WordPress permissions—could exploit the flaw. No special prerequisites beyond regular web‑site connectivity are required; the attack is inferred to involve sending crafted HTTP requests to the plug‑in. The risk thus rests primarily on the existence of this endpoint and the lack of access controls rather than on high‑privilege conditions.

Generated by OpenCVE AI on April 16, 2026 at 07:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the WP Quick Post Duplicator plug‑in to the latest version that omits the vulnerable code
  • If an upgrade is not possible, remove or deactivate the plug‑in to eliminate the exposed endpoints
  • Restrict access to any remaining plug‑in files by adjusting server permissions or implementing IP‐based restrictions to reduce the attack surface

Generated by OpenCVE AI on April 16, 2026 at 07:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Arul Prasad J WP Quick Post Duplicator wp-quick-post-duplicator allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Quick Post Duplicator: from n/a through <= 2.1.
Title WordPress WP Quick Post Duplicator plugin <= 2.1 - Broken Access Control vulnerability
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:14:11.222Z

Reserved: 2026-01-22T14:42:48.125Z

Link: CVE-2026-24387

cve-icon Vulnrichment

Updated: 2026-01-22T19:55:33.952Z

cve-icon NVD

Status : Deferred

Published: 2026-01-22T17:16:41.747

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-24387

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T07:45:06Z

Weaknesses