Cyber Posture

CVE-2026-1499

High

Published: 06 February 2026

Published
06 February 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0033 55.6th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

The WP Duplicate plugin for WordPress is vulnerable to Missing Authorization leading to Arbitrary File Upload in all versions up to and including 1.1.8. This is due to a missing capability check on the `process_add_site()` AJAX action combined with path…

more

traversal in the file upload functionality. This makes it possible for authenticated (subscriber-level) attackers to set the internal `prod_key_random_id` option, which can then be used by an unauthenticated attacker to bypass authentication checks and write arbitrary files to the server via the `handle_upload_single_big_file()` function, ultimately leading to remote code execution.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces required authorization checks on the process_add_site() AJAX action to prevent subscriber-level attackers from setting the prod_key_random_id option.

prevent

Applies least privilege to restrict subscriber-level users from accessing administrative AJAX handlers that manipulate sensitive plugin options.

prevent

Validates file paths in handle_upload_single_big_file() to block path traversal and arbitrary file writes by unauthenticated attackers.

Security SummaryAI

CVE-2026-1499, published on 2026-02-06, is a Missing Authorization vulnerability (CWE-862) in the WP Duplicate plugin for WordPress, affecting all versions up to and including 1.1.8. The issue stems from a missing capability check on the `process_add_site()` AJAX action, combined with path traversal in the file upload functionality. This allows authenticated attackers at the subscriber level to manipulate internal plugin options, enabling subsequent unauthenticated file uploads. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

An authenticated attacker with subscriber-level permissions can exploit the missing authorization in the `process_add_site()` AJAX handler to set the internal `prod_key_random_id` option. This option then permits an unauthenticated attacker to bypass authentication checks and invoke the `handle_upload_single_big_file()` function, allowing arbitrary file writes to the server via path traversal, which ultimately leads to remote code execution.

The provided references link to the plugin's source code in the WordPress plugin trac repository, specifically highlighting vulnerable code locations such as line 422 in `admin/class-local-sync-admin.php`, line 843 in `admin/class-local-sync-files-op.php`, and line 389 in `includes/class-local-sync-handle-server-requests.php` across tags/1.1.8 and trunk versions. No patch or mitigation details are specified in the available information.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Missing authorization and path traversal in arbitrary file upload allows unauthenticated RCE on public-facing WordPress plugin.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References