Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11972: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in stevejburge Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI

0
Medium
VulnerabilityCVE-2025-11972cvecve-2025-11972cwe-89
Published: Sat Nov 08 2025 (11/08/2025, 03:27:48 UTC)
Source: CVE Database V5
Vendor/Project: stevejburge
Product: Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI

Description

The Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI plugin for WordPress is vulnerable to SQL Injection via the 'post_types' parameter in all versions up to, and including, 3.40.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Editor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

AI-Powered Analysis

AILast updated: 11/15/2025, 04:50:16 UTC

Technical Analysis

CVE-2025-11972 identifies a SQL Injection vulnerability in the 'Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI' WordPress plugin, versions up to and including 3.40.0. The vulnerability stems from improper neutralization of special elements in the 'post_types' parameter, which is insufficiently escaped before being incorporated into SQL queries. This flaw allows an authenticated attacker with Editor-level or higher privileges to append arbitrary SQL commands to existing queries. The injection can be leveraged to extract sensitive information from the backend database, such as user credentials, configuration data, or other confidential content stored within the WordPress database. The vulnerability does not require user interaction beyond authentication and does not impact data integrity or availability, focusing primarily on confidentiality breaches. The CVSS 3.1 base score is 4.9 (medium), reflecting the network attack vector, low attack complexity, and the requirement for high privileges but no user interaction. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability is cataloged under CWE-89, indicating improper neutralization of special elements in SQL commands. The plugin’s widespread use in WordPress ecosystems makes this a relevant threat, especially for sites with multiple editors or contributors who have elevated privileges.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive data stored in WordPress databases, including potentially personal data protected under GDPR. Attackers with Editor-level access can exploit this flaw to extract confidential information without altering or destroying data, which could lead to privacy breaches, reputational damage, and regulatory penalties. Organizations relying on this plugin for content management or AI-assisted tagging are at risk, particularly if they have multiple editors or contributors with elevated privileges. The impact is heightened in sectors such as media, publishing, education, and e-commerce, where WordPress is commonly used and sensitive customer or business data may be stored. Although the vulnerability does not allow for denial of service or data modification, the confidentiality breach alone can have significant consequences, including facilitating further attacks or social engineering. The lack of known exploits in the wild suggests limited immediate threat, but the ease of exploitation by authenticated users warrants proactive mitigation. European entities must consider the GDPR implications of any data leakage resulting from this vulnerability.

Mitigation Recommendations

1. Immediately restrict Editor-level and higher privileges to trusted users only, minimizing the attack surface. 2. Monitor and audit database queries and WordPress logs for unusual or suspicious activity indicative of SQL injection attempts. 3. Implement Web Application Firewall (WAF) rules specifically targeting SQL injection patterns on the 'post_types' parameter. 4. Disable or remove the vulnerable plugin if it is not essential to operations until a patched version is released. 5. Engage with the plugin vendor or community to obtain or request a security patch and apply it promptly once available. 6. Employ principle of least privilege for WordPress roles, limiting the number of users with Editor or Administrator access. 7. Conduct regular security assessments and penetration testing focusing on WordPress plugins and custom code. 8. Backup WordPress databases regularly and securely to enable recovery in case of compromise. 9. Educate content editors about the risks of elevated privileges and encourage reporting of suspicious behavior. 10. Consider isolating WordPress instances or using containerization to limit lateral movement in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-20T15:36:04.101Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690ebeaf3a8fd010ecf64211

Added to database: 11/8/2025, 3:53:19 AM

Last enriched: 11/15/2025, 4:50:16 AM

Last updated: 11/20/2025, 9:30:26 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats