Description
The Tainacan plugin for WordPress is vulnerable to unauthorized metadata section creation due to missing authorization checks in all versions up to, and including, 1.0.1. This is due to the `create_item_permissions_check()` function unconditionally returning true, which bypasses authentication and authorization validation. This makes it possible for unauthenticated attackers to create arbitrary metadata sections for any collection via the public REST API granted they can access the WordPress site.
Published: 2025-12-21
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unrestricted Metadata Section Creation
Action: Assess Impact
AI Analysis

Impact

The flaw in Tainacan arises from a missing authorization check in the REST API; the create_item_permissions_check() function always returns true, allowing any requester to create new metadata sections. This enables an attacker to add arbitrary sections to any collection without authenticating, thereby modifying the data schema used by the site. The weakness is captured by CWE-862, Unauthorized Access Through Improper Access Control.

Affected Systems

The vulnerability affects the Tainacan plugin for WordPress in all releases up to and including version 1.0.1. Users who rely on these versions for managing collections are susceptible; newer releases are not known to be impacted.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, and the EPSS score of less than 1% suggests exploitation is unlikely in the wild. The vulnerability is not listed in the CISA KEV catalog, and no publicly reported exploit is available. Attackers can trigger the issue via the public REST API, which requires no authentication credentials. While the immediate impact is limited to unauthorized data structure changes, it could undermine trust and consistency of the collection metadata in affected WordPress sites.

Generated by OpenCVE AI on April 22, 2026 at 00:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Tainacan plugin to version 1.0.2 or later, which restores proper permission checks for metadata section creation.
  • Restrict the public REST API for metadata sections so that only users with appropriate roles can create sections, e.g., by setting endpoint permissions to "editor" or higher.
  • Implement logging and alerting for metadata section creation actions to detect and respond to unauthorized attempts.

Generated by OpenCVE AI on April 22, 2026 at 00:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 22 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 22 Dec 2025 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Tainacan
Tainacan tainacan
Wordpress
Wordpress wordpress
Vendors & Products Tainacan
Tainacan tainacan
Wordpress
Wordpress wordpress

Sun, 21 Dec 2025 02:45:00 +0000

Type Values Removed Values Added
Description The Tainacan plugin for WordPress is vulnerable to unauthorized metadata section creation due to missing authorization checks in all versions up to, and including, 1.0.1. This is due to the `create_item_permissions_check()` function unconditionally returning true, which bypasses authentication and authorization validation. This makes it possible for unauthenticated attackers to create arbitrary metadata sections for any collection via the public REST API granted they can access the WordPress site.
Title Tainacan <= 1.0.1 - Missing Authorization to Unauthenticated Arbitrary Metadata Section Creation
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Tainacan Tainacan
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:53:31.704Z

Reserved: 2025-12-04T16:14:29.071Z

Link: CVE-2025-14043

cve-icon Vulnrichment

Updated: 2025-12-22T20:21:51.949Z

cve-icon NVD

Status : Deferred

Published: 2025-12-21T03:15:52.153

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-14043

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T00:15:03Z

Weaknesses