CVE-2025-13359

6.5 MEDIUM

📋 TL;DR

This SQL injection vulnerability in the TaxoPress WordPress plugin allows authenticated attackers with contributor-level access to execute time-based SQL queries and extract sensitive database information. The vulnerability affects all plugin versions up to 3.40.1 and requires the attacker to have metabox access for taxonomies, which is enabled by default for contributors.

💻 Affected Systems

Products:
  • Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI (TaxoPress) WordPress plugin
Versions: All versions up to and including 3.40.1
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Metabox access for taxonomies is enabled by default for contributors, making the vulnerability exploitable with default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could extract sensitive data including user credentials, private content, or other database information, potentially leading to complete site compromise.

🟠

Likely Case

Attackers with contributor access could extract user data, private posts, or other sensitive information from the WordPress database.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to unauthorized data access from the compromised user's permitted scope.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated contributor-level access and knowledge of time-based SQL injection techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 3.40.1

Vendor Advisory: https://github.com/TaxoPress/TaxoPress/commit/1097a22181aa10ce55cc9cd5fa8495f7494e18ea

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'TaxoPress' plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download latest version from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Disable plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate taxopress

Restrict contributor access

all

Remove metabox access for contributors or restrict contributor accounts

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can access WordPress admin interface
  • Enable detailed SQL query logging and monitor for suspicious database activity

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin → Plugins → Installed Plugins. If TaxoPress version is 3.40.1 or lower, you are vulnerable.

Check Version:

wp plugin get taxopress --field=version

Verify Fix Applied:

Verify plugin version is higher than 3.40.1. Check the commit 1097a22181aa10ce55cc9cd5fa8495f7494e18ea is present in plugin files.

📡 Detection & Monitoring

Log Indicators:

  • Unusually long response times for AJAX requests to getTermsForAjax
  • Multiple SQL queries from single AJAX requests
  • Database errors in WordPress debug logs

Network Indicators:

  • Repeated POST requests to /wp-admin/admin-ajax.php with SQL-like parameters
  • Unusual timing patterns in AJAX responses

SIEM Query:

source="wordpress.log" AND "admin-ajax.php" AND "getTermsForAjax" AND (response_time>5000 OR "SQL" OR "database")

🔗 References

📤 Share & Export