Metaphorcreations

Post Duplicator

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 25.02.2026 09:26:51
  • Zuletzt bearbeitet 25.02.2026 14:15:29

The Post Duplicator plugin for WordPress is vulnerable to unauthorized arbitrary protected post meta insertion in all versions up to, and including, 3.0.8. This is due to the `duplicate_post()` function in `includes/api.php` using `$wpdb->insert()` d...

  • EPSS 0.18%
  • Veröffentlicht 24.01.2025 18:15:47
  • Zuletzt bearbeitet 09.06.2025 19:00:07

Missing Authorization vulnerability in Metaphor Creations Post Duplicator allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Post Duplicator: from n/a through 2.35.

  • EPSS 0.38%
  • Veröffentlicht 11.01.2025 03:15:21
  • Zuletzt bearbeitet 05.06.2025 15:20:02

The Post Duplicator plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.36 via the mtphr_duplicate_post() due to insufficient restrictions on which posts can be duplicated. This makes it possible for aut...

  • EPSS 0.17%
  • Veröffentlicht 09.12.2024 13:15:36
  • Zuletzt bearbeitet 09.06.2025 19:23:43

Missing Authorization vulnerability in Metaphor Creations Post Duplicator allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Post Duplicator: from n/a through 2.31.

  • EPSS 0.35%
  • Veröffentlicht 20.02.2023 17:15:11
  • Zuletzt bearbeitet 21.11.2024 02:45:31

A vulnerability was found in meta4creations Post Duplicator Plugin 2.18 on WordPress. It has been classified as problematic. Affected is the function mtphr_post_duplicator_notice of the file includes/notices.php. The manipulation of the argument post...

Exploit
  • EPSS 0.2%
  • Veröffentlicht 10.03.2022 17:42:36
  • Zuletzt bearbeitet 21.11.2024 06:09:41

A cross-site scripting (XSS) attack can cause arbitrary code (JavaScript) to run in a user's browser and can use an application as the vehicle for the attack. The XSS payload given in the "Duplicate Title" text box executes whenever the user opens th...