Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13354: CWE-862 Missing Authorization in stevejburge Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI

0
Medium
VulnerabilityCVE-2025-13354cvecve-2025-13354cwe-862
Published: Wed Dec 03 2025 (12/03/2025, 13:52:43 UTC)
Source: CVE Database V5
Vendor/Project: stevejburge
Product: Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI

Description

The Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 3.40.1. This is due to the plugin not properly verifying that a user is authorized to perform an action in the "taxopress_merge_terms_batch" function. This makes it possible for authenticated attackers, with subscriber level access and above, to merge or delete arbitrary taxonomy terms.

AI-Powered Analysis

AILast updated: 12/03/2025, 14:24:35 UTC

Technical Analysis

CVE-2025-13354 is an authorization bypass vulnerability classified under CWE-862 affecting the 'Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI' WordPress plugin developed by stevejburge. The vulnerability arises because the plugin does not properly check whether a user is authorized to perform certain actions within the 'taxopress_merge_terms_batch' function. Specifically, this function allows merging or deleting taxonomy terms, which are critical for organizing content in WordPress. The flaw permits any authenticated user with at least subscriber-level privileges to bypass authorization controls and manipulate taxonomy terms arbitrarily. This can lead to unauthorized modification or deletion of categories, tags, or other taxonomies, potentially disrupting site content organization and user experience. The vulnerability is remotely exploitable over the network without requiring user interaction beyond authentication. The CVSS v3.1 base score is 4.3 (medium severity), reflecting low complexity and no impact on confidentiality or availability, but a partial impact on integrity. No patches or fixes have been released at the time of this report, and no active exploitation has been observed. The vulnerability affects all versions up to and including 3.40.1 of the plugin. Given the widespread use of WordPress in Europe and the popularity of taxonomy management plugins, this vulnerability poses a risk to websites relying on this plugin for content categorization and tagging.

Potential Impact

For European organizations, this vulnerability primarily threatens the integrity of website content taxonomy. Unauthorized merging or deletion of taxonomy terms can disrupt content categorization, impair navigation, and degrade user experience on corporate or public-facing websites. This could indirectly affect brand reputation and user trust. While the vulnerability does not expose sensitive data or cause denial of service, the ability for low-privilege authenticated users to alter site structure could facilitate further attacks, such as SEO manipulation or content spoofing. Organizations relying on WordPress for e-commerce, news, or informational portals may face operational disruptions. Additionally, regulatory compliance related to website integrity and content management (e.g., under GDPR for accurate information presentation) could be impacted if unauthorized changes are not detected and corrected promptly. The risk is heightened for organizations with many subscriber-level users or where user account management is less stringent.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify if the vulnerable plugin and versions are in use. Until an official patch is released, mitigation can include: 1) Restricting subscriber-level user capabilities by using role management plugins to limit access to taxonomy management functions. 2) Implementing Web Application Firewall (WAF) rules to detect and block requests targeting the 'taxopress_merge_terms_batch' function or suspicious taxonomy modification attempts. 3) Monitoring logs for unusual taxonomy term merges or deletions and setting up alerts for such activities. 4) Temporarily disabling or removing the vulnerable plugin if taxonomy management is not critical or can be handled by alternative secure plugins. 5) Enforcing strong authentication and user account hygiene to reduce the number of potentially exploitable accounts. 6) Preparing to apply vendor patches promptly once available and testing updates in staging environments before production deployment. 7) Educating site administrators about the risk and signs of exploitation to enable rapid response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-18T11:43:32.191Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6930444551392e1c8b19b537

Added to database: 12/3/2025, 2:08:05 PM

Last enriched: 12/3/2025, 2:24:35 PM

Last updated: 12/4/2025, 8:00:57 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats