CVE-2024-13468
Published: 19 February 2025
Description
The Trash Duplicate and 301 Redirect plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'duplicates-action-top' action in all versions up to, and including, 1.9. This makes it possible for unauthenticated attackers to delete arbitrary posts/pages.
Security Summary
CVE-2024-13468 is a vulnerability in the Trash Duplicate and 301 Redirect plugin for WordPress, affecting all versions up to and including 1.9. It stems from a missing capability check on the 'duplicates-action-top' action, enabling unauthorized loss of data and classified under CWE-862 (Missing Authorization). The issue carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N), highlighting high integrity impact with no confidentiality or availability effects.
Unauthenticated attackers can exploit this vulnerability remotely over the network with low attack complexity and no user interaction required. Exploitation allows them to delete arbitrary posts and pages on the targeted WordPress site, potentially disrupting content management without needing any privileges.
Advisories reference the plugin's WordPress.org page, a development trac changeset (3343764) in the trash-duplicate-and-301-redirect repository, and Wordfence threat intelligence, which detail the fix applied post-version 1.9. Mitigation involves updating the plugin to a patched version beyond 1.9.
Details
- CWE(s)