First published: Wed Feb 19 2025(Updated: )
The Trash Duplicate and 301 Redirect plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'duplicates-action-top' action in all versions up to, and including, 1.9. This makes it possible for unauthenticated attackers to delete arbitrary posts/pages.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Trash Duplicate and 301 Redirect | <=1.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13468 is considered a high severity vulnerability due to its potential for unauthorized data deletion.
To mitigate CVE-2024-13468, update the Trash Duplicate and 301 Redirect plugin to version 1.10 or later.
CVE-2024-13468 affects all users of the Trash Duplicate and 301 Redirect plugin for WordPress versions up to and including 1.9.
Yes, CVE-2024-13468 can be exploited remotely by unauthenticated attackers.
CVE-2024-13468 is a data loss vulnerability due to a lack of sufficient capability checks.