CVE-2025-13354

4.3 MEDIUM

📋 TL;DR

This vulnerability allows authenticated WordPress users with subscriber-level access or higher to merge or delete arbitrary taxonomy terms without proper authorization. It affects all WordPress sites using the TaxoPress plugin up to version 3.40.1. Attackers can manipulate site structure and content organization.

💻 Affected Systems

Products:
  • TaxoPress - Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI plugin for WordPress
Versions: All versions up to and including 3.40.1
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with TaxoPress plugin enabled. Vulnerability is present in default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious users could delete or merge critical taxonomy terms, disrupting site navigation, breaking content organization, and potentially causing SEO damage or broken links.

🟠

Likely Case

Subscribers or low-privilege users could manipulate tags, categories, or custom taxonomies to disrupt content organization or create confusion.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to minor taxonomy manipulation that can be restored from backups.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with at least subscriber privileges. The vulnerability is in the taxopress_merge_terms_batch function.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.40.2 and later

Vendor Advisory: https://github.com/TaxoPress/TaxoPress/commit/5eb2cee861ebd109152eea968aca0259c078c8b0

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find TaxoPress plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 3.40.2+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable vulnerable function via code modification

all

Temporarily disable the taxopress_merge_terms_batch function until patch can be applied

Edit wp-content/plugins/simple-tags/inc/class.client.php and comment out or remove the taxopress_merge_terms_batch function

Restrict user capabilities

all

Remove taxonomy management capabilities from subscriber and contributor roles

Use WordPress role management plugin or add code to functions.php to remove 'manage_categories' capability from low-privilege roles

🧯 If You Can't Patch

  • Temporarily deactivate the TaxoPress plugin until patched version is available
  • Implement strict monitoring of taxonomy changes and user activity logs

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → TaxoPress version. If version is 3.40.1 or lower, you are vulnerable.

Check Version:

wp plugin list --name=taxopress --field=version (if WP-CLI installed)

Verify Fix Applied:

After updating, verify TaxoPress version is 3.40.2 or higher in WordPress plugins page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual taxonomy merge or delete operations
  • Taxonomy changes from low-privilege user accounts
  • Multiple taxonomy modifications in short timeframes

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action=taxopress_merge_terms_batch from non-admin users

SIEM Query:

source="wordpress" AND (event_type="taxonomy_merge" OR event_type="taxonomy_delete") AND user_role IN ("subscriber", "contributor")

🔗 References

📤 Share & Export