
Yoast Duplicate Post Security & Risk Analysis
wordpress.org/plugins/duplicate-postThe go-to tool for cloning posts and pages, including the powerful Rewrite & Republish feature.
Is Yoast Duplicate Post Safe to Use in 2026?
Generally Safe
Score 92/100Yoast Duplicate Post has a strong security track record. Known vulnerabilities have been patched promptly.
The "duplicate-post" v4.6 plugin presents a mixed security posture. On the positive side, it demonstrates good practices by utilizing prepared statements for all SQL queries and avoids file operations and external HTTP requests, which are common vectors for compromise. However, significant concerns arise from the static analysis. The presence of an unprotected AJAX handler provides a direct entry point for attackers without authentication, posing a risk of unauthorized actions. Furthermore, a substantial portion (47%) of its output escaping is not properly handled, indicating a potential for Cross-Site Scripting (XSS) vulnerabilities if user-controlled data is not adequately sanitized before being displayed. The taint analysis, while not revealing critical or high severity flows, does show unsanitized paths, which can be a precursor to vulnerabilities if combined with other factors or future code changes.
The vulnerability history reveals a pattern of past security flaws, including a critical SQL injection and medium XSS vulnerabilities. The existence of a critical vulnerability in its history, even if currently patched, indicates a potential for recurring or similar issues in the codebase. While there are no currently unpatched CVEs, the historical prevalence of these types of vulnerabilities and the presence of an unprotected AJAX handler and unescaped output in the current version suggest that the plugin may require more rigorous security auditing and development practices to ensure long-term security.
Key Concerns
- Unprotected AJAX handler
- Significant percentage of unescaped output
- Unsanitized paths in taint analysis
- History of critical vulnerability
- History of medium vulnerabilities
Yoast Duplicate Post Security Vulnerabilities
CVEs by Year
Severity Breakdown
3 total CVEs
Duplicate Post <= 3.2.3 - Authenticated (Administrator+) Stored Cross-Site Scripting
Yoast Duplicate Post <= 2.5 - SQL Injection
Yoast Duplicate Post <= 2.6 - Cross-Site Scripting
Yoast Duplicate Post Code Analysis
Output Escaping
Data Flow Analysis
Yoast Duplicate Post Attack Surface
AJAX Handlers 1
WordPress Hooks 17
Maintenance & Trust
Yoast Duplicate Post Maintenance & Trust
Maintenance Signals
Community Trust
Yoast Duplicate Post Alternatives
WP Duplicate Page
wp-duplicate-page
Clone WordPress page, post, custom post types
Clone Posts
clone-posts
Easily clone (duplicate) Posts, Pages and Custom Post Types, including their custom fields (post_meta)
Simple Content Templates for Blog Posts & Pages
simple-post-template
Create content templates for your posts and pages. When creating a new post or page use one of your content templates as the starting point!
Duplicate Post by AIOSEO – Easily Clone and Republish Content
duplicate-post-page-aioseo
Duplicate Post by AIOSEO lets you clone and schedule revisions for your posts & pages with just one click.
Duplicate All
informigados-duplicate-all
The easiest way to duplicate pages, posts, and custom post types with a single click. Fully compatible with page builders like Elementor.
Yoast Duplicate Post Developer Profile
7 plugins · 14.2M total installs
How We Detect Yoast Duplicate Post
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/duplicate-post/css/duplicate-post-admin-bar.css/wp-content/plugins/duplicate-post/css/duplicate-post-admin-bar-rtl.css/wp-content/plugins/duplicate-post/js/duplicate-post-admin-bar.js/wp-content/plugins/duplicate-post/js/duplicate-post-admin-bar.jsduplicate-post/css/duplicate-post-admin-bar.css?ver=duplicate-post/js/duplicate-post-admin-bar.js?ver=HTML / DOM Fingerprints
ab-iconab-labelaria-label="Settings for Duplicate Post"