Description
The Taskbuilder – Project Management & Task Management Tool With Kanban Board plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'project_search' parameter in all versions up to, and including, 5.0.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2026-05-14
Score: 6.5 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Taskbuilder plugin for WordPress is vulnerable to a time‑based blind SQL injection that allows an authenticated subscriber or higher to inject and execute additional SQL statements. Because the plugin does not escape the project_search input or prepare the query, attackers can retrieve arbitrary data from the database, resulting in confidential information disclosure.

Affected Systems

The vulnerability affects the ‘Taskbuilder – Project Management & Task Management Tool With Kanban Board’ WordPress plugin in all releases up to and including version 5.0.6. No other versions are listed as impacted.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate severity, and the lack of an EPSS score or KEV listing suggests that the vulnerability is not widely exploited. However, the attack requires valid Subscriber credentials, so the exposure is limited to authorized users who can trigger the project_search parameter. The attack vector is internal web application, and the attacker must have network access to the WordPress site.

Generated by OpenCVE AI on May 14, 2026 at 08:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Taskbuilder plugin to a version newer than 5.0.6, which removes the unsanitized project_search handling.
  • If an immediate update is not possible, disable or remove the project_search functionality for Subscriber and higher roles to prevent injection attempts.
  • Enforce least‑privilege principles by restricting Subscriber accounts to the minimum capabilities required for their tasks, thereby reducing the window of opportunity for injection exploitation.

Generated by OpenCVE AI on May 14, 2026 at 08:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 14 May 2026 07:00:00 +0000

Type Values Removed Values Added
Description The Taskbuilder – Project Management & Task Management Tool With Kanban Board plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'project_search' parameter in all versions up to, and including, 5.0.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title Taskbuilder – Project Management & Task Management Tool With Kanban Board <= 5.0.6 - Authenticated (Subscriber+) Time-Based Blind SQL Injection via 'project_search' Parameter
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-14T06:44:10.873Z

Reserved: 2026-04-13T13:52:06.196Z

Link: CVE-2026-6225

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-14T07:16:20.373

Modified: 2026-05-14T07:16:20.373

Link: CVE-2026-6225

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T08:30:16Z

Weaknesses