Cyber Posture

CVE-2024-13468

High

Published: 19 February 2025

Published
19 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score 0.0019 40.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

The Trash Duplicate and 301 Redirect plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'duplicates-action-top' action in all versions up to, and including, 1.9. This makes it possible for unauthenticated attackers to delete arbitrary posts/pages.

Security Summary

CVE-2024-13468 is a vulnerability in the Trash Duplicate and 301 Redirect plugin for WordPress, affecting all versions up to and including 1.9. It stems from a missing capability check on the 'duplicates-action-top' action, enabling unauthorized loss of data and classified under CWE-862 (Missing Authorization). The issue carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N), highlighting high integrity impact with no confidentiality or availability effects.

Unauthenticated attackers can exploit this vulnerability remotely over the network with low attack complexity and no user interaction required. Exploitation allows them to delete arbitrary posts and pages on the targeted WordPress site, potentially disrupting content management without needing any privileges.

Advisories reference the plugin's WordPress.org page, a development trac changeset (3343764) in the trash-duplicate-and-301-redirect repository, and Wordfence threat intelligence, which detail the fix applied post-version 1.9. Mitigation involves updating the plugin to a patched version beyond 1.9.

Details

CWE(s)
CWE-862

References