Yoast Duplicate Post Vulnerability (Medium) – CVE-2019-25314

Yoast Duplicate Post Vulnerability (Medium) – CVE-2019-25314

by | Feb 13, 2026 | Plugins

Attack Vectors

Yoast Duplicate Post (slug: duplicate-post) versions up to and including 3.2.3 have a Medium-severity (CVSS 5.5) Stored Cross-Site Scripting (XSS) vulnerability tracked as CVE-2019-25314.

The key risk scenario is an authenticated, high-privilege user (Admin+ level access) injecting a malicious script into WordPress administrative pages through certain plugin parameters (for example, duplicate_post_title_prefix). Because this is stored, the script can persist and run later when an administrator views affected admin pages.

This issue only affects WordPress multi-site installations and environments where unfiltered_html has been disabled. In those configurations, organizations should treat the vulnerability as a realistic insider-risk or compromised-admin-account scenario rather than a public, unauthenticated attack.

Security Weakness

The underlying weakness is Stored XSS in Yoast Duplicate Post <= 3.2.3, where certain inputs can be saved and later rendered in the WordPress admin interface without sufficient safeguards to prevent injected scripts from executing.

Stored XSS in admin-facing pages is especially relevant for business stakeholders because it can quietly persist in the system, potentially blending into normal administrative workflows and triggering when trusted team members access the dashboard.

Although exploitation requires high-level authenticated permissions, that does not eliminate risk: it increases the importance of account security, role governance, and monitoring for privileged user actions—particularly in multi-site deployments.

Technical or Business Impacts

Operational risk: A stored script executing in the admin area can disrupt administrative activity, change how pages render, or create confusion during content operations—especially impactful for marketing teams running frequent campaigns and updates.

Security and compliance risk: An injected script running in a trusted admin context can be used to manipulate what administrators see or do in the dashboard, which can undermine governance controls and increase the likelihood of unauthorized changes. For organizations with compliance requirements, the presence of a known, unpatched vulnerability can also create audit and policy exposure.

Brand and revenue risk: Even when the impact is contained to administrative pages, any security incident affecting website governance can slow campaign execution, delay launches, and raise concerns with stakeholders about the integrity of digital channels.

Recommended action: Update Yoast Duplicate Post to version 3.2.4 or newer (patched). Prioritize multi-site environments and any installation where unfiltered_html is disabled. Use this patch cycle as an opportunity to review privileged access controls, admin account hygiene, and change monitoring for WordPress administrative settings.

Similar Attacks

Stored and admin-context XSS issues are a common way attackers (or malicious insiders) abuse trusted interfaces to run scripts and influence administrative actions. A few real examples to be aware of:

Wordfence vulnerability record for Yoast Duplicate Post (CVE-2019-25314) (source reference for this issue).

CVE Details: CWE-79 (Cross-site Scripting) vulnerability list (broader examples of real-world XSS vulnerabilities).

OWASP: Cross-Site Scripting (XSS) (industry guidance and examples of how XSS is used).

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers