Yoast Duplicate Post Vulnerability (Medium) – CVE-2026-1217

Yoast Duplicate Post Vulnerability (Medium) – CVE-2026-1217

by | Mar 17, 2026 | Plugins

Attack Vectors

CVE-2026-1217 affects the WordPress plugin Yoast Duplicate Post (slug: duplicate-post) in versions up to and including 4.5. The severity is Medium (CVSS 5.4; vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).

This issue can be exploited by an authenticated user with at least Contributor access. In practical terms, this means the risk is highest on sites where multiple people have logins (marketing teams, agencies, freelancers, contractors, guest authors, or any environment with frequent user onboarding/offboarding).

According to the published advisory, a Contributor-level attacker can duplicate posts they should not be able to access (including private, draft, and trashed posts). Additionally, an attacker with Author-level access or higher can misuse the plugin’s Rewrite & Republish feature to overwrite published posts with their own content.

Security Weakness

The root cause is a missing authorization (capability) check in specific plugin functions: clone_bulk_action_handler() and republish_request(). Because the plugin does not properly confirm that the logged-in user is allowed to perform these actions on the targeted content, users with relatively low privileges can trigger duplication and republishing behaviors outside of their intended permissions.

This is a classic “who is allowed to do what” control failure. Even if your WordPress site has strong passwords and MFA, the problem is that the plugin may allow legitimate-but-limited accounts to perform actions that exceed their role.

Reference: CVE-2026-1217 (and the corresponding Wordfence entry: source advisory).

Technical or Business Impacts

Brand and revenue risk: If an Author (or higher) account is compromised—or if an internal account is misused—attackers may be able to overwrite published content. That can result in defaced landing pages, misleading product claims, malicious outbound links, or SEO spam, all of which can directly impact lead generation, conversion rates, and brand trust.

Confidentiality exposure: The ability for Contributor-level users to duplicate private or unpublished posts increases the risk of leaking embargoed announcements, unapproved campaigns, sensitive internal messaging, or regulated disclosures that were not meant to be public.

Operational disruption: Unauthorized cloning and overwriting can create editorial chaos—incorrect versions going live, content approvals being bypassed, and time-consuming rollback/incident response work for marketing and web teams.

Compliance implications: For organizations with formal review processes (legal/compliance sign-off, financial disclosures, healthcare or privacy requirements), unauthorized content changes can create audit findings and potential regulatory exposure if claims or notices are altered without approval.

Remediation: Update Yoast Duplicate Post to version 4.6 or a newer patched version.

Similar Attacks

Authorization and content-modification flaws in CMS ecosystems are a common pattern because they can be abused by low-privilege accounts or compromised credentials. A few well-documented examples include:

WordPress core REST API content injection (CVE-2017-1001000)
WooCommerce privilege/authorization-related vulnerability (CVE-2018-19207)
File Manager plugin vulnerability widely abused in the wild (CVE-2020-25213)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers