Description
Cross-Site Request Forgery (CSRF) vulnerability in John James Jacoby WP Term Order wp-term-order allows Cross Site Request Forgery.This issue affects WP Term Order: from n/a through <= 2.1.0.
Published: 2026-01-23
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Data Modification via CSRF
Action: Patch
AI Analysis

Impact

The WordPress WP Term Order plugin version 2.1.0 and earlier suffers from a Cross‑Site Request Forgery vulnerability (CWE‑352). A crafted request originating from an external site can trigger the plugin to reorder taxonomy terms or modify term status without the target user’s explicit intent. An attacker can thereby alter site content or taxonomy structure, potentially affecting navigation, post categorization, and other functionality that relies on term ordering.

Affected Systems

Affected applications are WordPress installations that have the WP Term Order plugin by John James Jacoby with a plugin version of 2.1.0 or earlier installed. No other plugins or WordPress core components are listed as vulnerable.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate impact. The EPSS score of less than 1% denotes a very low likelihood of active exploitation at present, and the vulnerability is not listed in the CISA KEV catalog. Attackers would need to entice a logged‑in user to visit a malicious link or submit a forged form that the attacker controls. The compromised account would then be able to perform unintended term reordering actions. The low exploit probability combined with moderate impact suggests that patching or mitigation should be prioritized but does not require immediate emergency response.

Generated by OpenCVE AI on April 16, 2026 at 01:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WP Term Order to any version newer than 2.1.0
  • If an upgrade is not possible immediately, temporarily disable the plugin or remove it from the WordPress installation
  • Add WordPress CSRF nonces to all plugin forms and verify them before processing term reordering requests
  • Consider using a security plugin that monitors for suspicious request patterns and blocks unauthorized actions

Generated by OpenCVE AI on April 16, 2026 at 01:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 27 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 23 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in John James Jacoby WP Term Order wp-term-order allows Cross Site Request Forgery.This issue affects WP Term Order: from n/a through <= 2.1.0.
Title WordPress WP Term Order plugin <= 2.1.0 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:48.889Z

Reserved: 2026-01-23T12:31:46.853Z

Link: CVE-2026-24542

cve-icon Vulnrichment

Updated: 2026-01-27T19:58:24.470Z

cve-icon NVD

Status : Deferred

Published: 2026-01-23T15:16:10.497

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-24542

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T02:00:12Z

Weaknesses