Description
The Tainacan plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'search' parameter in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2025-11-21
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

The Tainacan plugin for WordPress is vulnerable to reflected cross‑site scripting because the 'search' parameter is not properly sanitized or escaped when generating output. An attacker can embed malicious JavaScript into this parameter, which will be reflected back to the browser in search result pages. If a user clicks a crafted link, the script will execute in the context of that user, potentially allowing the attacker to steal session cookies, deface the site, or perform other client‑side attacks.

Affected Systems

All installations of the Tainacan plugin for WordPress, version 1.0.0 and earlier, are affected. The vulnerability is present in every release up to and including 1.0.0.

Risk and Exploitability

The CVSS score is 6.1, indicating moderate severity. The EPSS score is less than 1 %, implying a very low probability of exploitation at this time. The vulnerability is not listed in CISA’s KEV catalog. Attackers can exploit it by enticing a user to visit a specially crafted URL containing the malicious search query; no authentication is required. Because the payload is reflected directly into the response, the attack does not depend on server configuration beyond the presence of the vulnerable parameter.

Generated by OpenCVE AI on April 22, 2026 at 21:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Tainacan plugin to the latest version that includes the security fix for the search parameter.
  • Configure a Content‑Security‑Policy that disallows inline scripts or restricts script sources to trusted origins, reducing the impact if an XSS payload is delivered.
  • If upgrading is not possible, sanitize the 'search' parameter server‑side by stripping or escaping potentially hazardous characters before using it in any output.

Generated by OpenCVE AI on April 22, 2026 at 21:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 26 Jan 2026 15:30:00 +0000


Mon, 24 Nov 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Tainacan
Tainacan tainacan
Wordpress
Wordpress wordpress
Vendors & Products Tainacan
Tainacan tainacan
Wordpress
Wordpress wordpress

Fri, 21 Nov 2025 07:45:00 +0000

Type Values Removed Values Added
Description The Tainacan plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'search' parameter in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title Tainacan <= 1.0.0 - Reflected Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Tainacan Tainacan
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:32:28.556Z

Reserved: 2025-11-05T14:43:41.861Z

Link: CVE-2025-12746

cve-icon Vulnrichment

Updated: 2026-01-26T14:43:45.301Z

cve-icon NVD

Status : Deferred

Published: 2025-11-21T08:15:53.930

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12746

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T21:15:27Z

Weaknesses