CVE-2019-25314
Description
Yoast Duplicate-Post WordPress Plugin 3.2.3 contains a persistent cross-site scripting vulnerability in plugin settings parameters. Attackers can inject malicious scripts into title prefix, suffix, menu order, and blacklist fields to execute arbitrary JavaScript in admin interfaces.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Yoast Duplicate Post 3.2.3 has a stored XSS in plugin settings, allowing admin-level script injection.
Vulnerability
Overview
The Yoast Duplicate Post plugin for WordPress, version 3.2.3, contains a persistent (stored) cross-site scripting (XSS) vulnerability. The flaw resides in the plugin's settings panel, specifically within the 'Title prefix', 'Title suffix', 'Increase menu order by', and 'Do not copy these fields' parameters. The plugin fails to properly sanitize or escape user-supplied input before storing it, allowing attackers to inject arbitrary HTML and JavaScript [1][3][4].
Exploitation
Details
An attacker who can access the WordPress admin interface (with sufficient privileges, typically Administrator) can navigate to the Duplicate Post settings page at /wp-admin/options-general.php?page=duplicatepost. By crafting a payload such as "> within the vulnerable fields and saving the changes, the malicious script is stored in the WordPress options table. Subsequently, any time an administrator visits the settings page, the injected script is rendered and executed in their browser context, without requiring any further user interaction [3].
Impact
Successful exploitation enables an attacker to execute arbitrary JavaScript in the context of the WordPress admin dashboard. This can lead to session hijacking, forced administrative actions, defacement of admin pages, or redirection to malicious sites. The attack is persistent, meaning the injected script remains active until the payload is manually removed from the stored settings [4].
Mitigation
Status
Users should update to the latest version of the Yoast Duplicate Post plugin (patched after 3.2.3). The vulnerability has been documented since June 2019 [3]. No official workaround is available other than ensuring the plugin is kept up to date and limiting administrative access to trusted users only.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: =3.2.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- duplicate-post.lopo.itnvd
- wordpress.org/plugins/duplicate-post/nvd
- www.exploit-db.com/exploits/47424nvd
- www.vulncheck.com/advisories/duplicate-post-persistent-cross-site-scriptingnvd
- www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/duplicate-post/yoast-duplicate-post-323-authenticated-admin-stored-cross-site-scriptingnvd
News mentions
0No linked articles in our index yet.