Impact
The vulnerability allows an attacker who is logged in with Subscriber level access or higher to insert arbitrary shortcode syntax into parameters such as task_id. Because the callback_search() function fails to verify the user's capability and sanitization fails to strip the shortcode brackets, the malicious input is concatenated into a do_shortcode() call which then executes the shortcode on the site. This can lead to execution of arbitrary shortcodes that may embed malicious code, alter site content, or exfiltrate data, thereby compromising the integrity and potential confidentiality of the WordPress installation.
Affected Systems
WordPress sites running the Task Manager plugin from eoxia, any release up to and including version 3.0.2. The vulnerability is present in all plugin versions that included the vulnerable callback_search() implementation.
Risk and Exploitability
The CVSS score of 6.5 indicates a medium severity, and the lack of an EPSS score, combined with its absence from the CISA KEV catalog, suggests the risk is moderate. An attacker requires only authenticated access at the Subscriber level, which is a relatively low privilege in many sites, making exploitation more likely for sites with many such users.
OpenCVE Enrichment