CVE-2023-49835

4.3 MEDIUM

📋 TL;DR

This vulnerability allows attackers to exploit missing authorization checks in the Post Duplicator WordPress plugin, enabling unauthorized users to duplicate posts. It affects all WordPress sites running Post Duplicator versions up to 2.31. The issue stems from improper access control that fails to verify user permissions.

💻 Affected Systems

Products:
  • Metaphor Creations Post Duplicator WordPress Plugin
Versions: n/a through 2.31
Operating Systems: All platforms running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users could duplicate sensitive posts, modify content, or disrupt site operations by creating excessive duplicate content.

🟠

Likely Case

Low-privileged users or attackers could duplicate posts they shouldn't have access to, potentially exposing draft content or manipulating published material.

🟢

If Mitigated

With proper user role management and access controls, impact would be limited to authorized users only.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of user access but bypasses authorization checks for post duplication functionality.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.32 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/post-duplicator/vulnerability/wordpress-post-duplicator-plugin-2-31-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Post Duplicator and click 'Update Now'. 4. Verify version is 2.32 or higher.

🔧 Temporary Workarounds

Disable Post Duplicator Plugin

all

Temporarily deactivate the vulnerable plugin until patched

wp plugin deactivate post-duplicator

Restrict User Roles

all

Limit user accounts with post editing capabilities to trusted personnel only

🧯 If You Can't Patch

  • Implement strict user role management and review all accounts with post editing permissions
  • Monitor post duplication activities and audit logs for unauthorized actions

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Post Duplicator version

Check Version:

wp plugin get post-duplicator --field=version

Verify Fix Applied:

Verify Post Duplicator version is 2.32 or higher in WordPress plugins list

📡 Detection & Monitoring

Log Indicators:

  • Multiple post duplication events from same user in short time
  • Post duplication by users without proper permissions

Network Indicators:

  • Unusual POST requests to post duplication endpoints

SIEM Query:

source="wordpress" AND (event="post_duplicate" OR uri="/wp-admin/admin-ajax.php") AND action="duplicate_post"

🔗 References

📤 Share & Export