You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
The WP Duplicate plugin for WordPress is vulnerable to...
Critical severity
Unreviewed
Published
Feb 6, 2026
to the GitHub Advisory Database
•
Updated Feb 6, 2026
The WP Duplicate plugin for WordPress is vulnerable to Missing Authorization leading to Arbitrary File Upload in all versions up to and including 1.1.8. This is due to a missing capability check on the process_add_site() AJAX action combined with path traversal in the file upload functionality. This makes it possible for authenticated (subscriber-level) attackers to set the internal prod_key_random_id option, which can then be used by an unauthenticated attacker to bypass authentication checks and write arbitrary files to the server via the handle_upload_single_big_file() function, ultimately leading to remote code execution.
The WP Duplicate plugin for WordPress is vulnerable to Missing Authorization leading to Arbitrary File Upload in all versions up to and including 1.1.8. This is due to a missing capability check on the
process_add_site()AJAX action combined with path traversal in the file upload functionality. This makes it possible for authenticated (subscriber-level) attackers to set the internalprod_key_random_idoption, which can then be used by an unauthenticated attacker to bypass authentication checks and write arbitrary files to the server via thehandle_upload_single_big_file()function, ultimately leading to remote code execution.References