{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T03:01:54.713","vulnerabilities":[{"cve":{"id":"CVE-2025-14001","sourceIdentifier":"security@wordfence.com","published":"2026-01-13T12:15:48.630","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The WP Duplicate Page plugin for WordPress is vulnerable to unauthorized modification of data due to missing capability checks on the 'duplicateBulkHandle' and 'duplicateBulkHandleHPOS' functions in all versions up to, and including, 1.8. This makes it possible for authenticated attackers, with Contributor-level access and above, to duplicate arbitrary posts, pages, and WooCommerce HPOS orders even when their role is explicitly excluded from the plugin's \"Allowed User Roles\" setting, potentially exposing sensitive information and allowing duplicate fulfillment of WooCommerce orders."},{"lang":"es","value":"El plugin WP Duplicate Page para WordPress es vulnerable a la modificación no autorizada de datos debido a la falta de comprobaciones de capacidad en las funciones 'duplicateBulkHandle' y 'duplicateBulkHandleHPOS' en todas las versiones hasta la 1.8, inclusive. Esto hace posible que atacantes autenticados, con acceso de nivel Colaborador o superior, dupliquen publicaciones, páginas y pedidos HPOS de WooCommerce arbitrarios incluso cuando su rol está explícitamente excluido de la configuración 'Roles de usuario permitidos' del plugin, exponiendo potencialmente información sensible y permitiendo el cumplimiento duplicado de pedidos de WooCommerce."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-862"}]}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/wp-duplicate-page/tags/1.8/includes/Classes/ButtonDuplicate.php#L54","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/browser/wp-duplicate-page/tags/1.8/includes/Classes/ButtonDuplicate.php#L79","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/changeset/3432233/","source":"security@wordfence.com"},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/60830ed8-3ab8-44e8-899c-7032a187da8b?source=cve","source":"security@wordfence.com"}]}}]}