Impact
The TP Restore Categories And Taxonomies plugin for WordPress fails to enforce sufficient permissions when processing the tpmcattt_delete_term AJAX action. Although a nonce is verified, it is generated for all authenticated users and can be retrieved from any wp-admin page, including those accessible by Subscribers. Consequently, authorized users with Subscriber or higher privileges can send a crafted request to permanently delete taxonomy terms from the plugin’s backup tables, effectively removing categorized content without appropriate approval.
Affected Systems
This issue affects the WordPress plugin TP Restore Categories And Taxonomies in all releases up to and including version 1.0.1. Users running any of these versions on a WordPress installation are potentially exposed to the vulnerability.
Risk and Exploitability
The CVSS score of 4.3 places this vulnerability in the moderate range. No EPSS data is available and it is not listed in the CISA KEV catalog. An attacker needs only a valid subscriber‑level account and the ability to interact with the site's wp-admin area to obtain the nonce, after which a simple AJAX request can delete taxonomy records. The lack of a capability check and the universal availability of the nonce make exploitation straightforward for any authenticated user.
OpenCVE Enrichment