Impact
The vulnerability lies in the getTermsForAjax function of the Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI plugin. Insufficient escaping of user-supplied parameters and the lack of prepared statements allow attackers to inject additional SQL clauses into existing queries via a time-based technique. This can be used to pull sensitive information from the WordPress database. The weakness corresponds to CWE-89.
Affected Systems
All releases of the TaxoPress Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI plugin up to and including version 3.40.1 are affected. The plugin is maintained by stevejburge and runs on WordPress; contributors or higher roles who have the default metabox access for taxonomies can trigger the flaw.
Risk and Exploitability
The CVSS score of 6.5 indicates a medium-severity flaw, and the EPSS score of < 1% suggests a low probability of exploitation at this time. The attack requires authenticated access at contributor level or higher and utilizes the AJAX endpoint, making it a low-latency, time-based injection. Although the vulnerability is not listed in the CISA KEV catalog, the potential for database compromise warrants immediate attention.
OpenCVE Enrichment