CVE-2025-13922: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in stevejburge Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI
The Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'existing_terms_orderby' parameter in the AI preview AJAX endpoint in all versions up to, and including, 3.40.1. This is due to insufficient escaping on user-supplied parameters and lack of SQL query parameterization. This makes it possible for authenticated attackers, with Contributor-level access and above who have AI metabox permissions, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database, cause performance degradation, or enable data inference through time-based techniques.
AI Analysis
Technical Summary
The vulnerability CVE-2025-13922 affects the 'Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI' WordPress plugin, versions up to and including 3.40.1. It is a time-based blind SQL Injection flaw caused by insufficient escaping and lack of parameterization of the 'existing_terms_orderby' parameter in the AI preview AJAX endpoint. Authenticated attackers with Contributor-level access and AI metabox permissions can inject arbitrary SQL commands appended to legitimate queries. This allows them to extract sensitive information from the database by measuring response times, potentially leading to data leakage. The vulnerability does not require user interaction but does require authentication with specific permissions, limiting the attack surface to insiders or compromised accounts. The flaw does not directly affect data integrity or availability but can cause performance degradation and information disclosure. No patches are currently linked, and no known exploits have been observed in the wild. The CVSS 3.1 score is 6.5 (medium), reflecting network attack vector, low complexity, privileges required, no user interaction, and high confidentiality impact. The vulnerability falls under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command).
Potential Impact
For European organizations, this vulnerability poses a significant risk to WordPress sites using the affected plugin, especially those that allow Contributor-level users to access AI metabox features. Successful exploitation can lead to unauthorized disclosure of sensitive data stored in the WordPress database, including user information, site configuration, or other confidential content. This can result in privacy violations under GDPR and damage organizational reputation. Performance degradation caused by injected queries may disrupt site availability temporarily, impacting business operations and user experience. Since the attack requires authenticated access, insider threats or compromised Contributor accounts are primary concerns. Organizations relying heavily on WordPress for content management and AI tagging functionalities are particularly vulnerable. The lack of current patches increases exposure time, emphasizing the need for immediate mitigation. The medium severity indicates a moderate but actionable threat level.
Mitigation Recommendations
1. Immediately restrict Contributor-level user permissions, especially revoking AI metabox access until a patch is available. 2. Monitor and audit Contributor account activities for unusual behavior or access patterns. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious SQL injection payloads targeting the 'existing_terms_orderby' parameter in AJAX requests. 4. Employ database query logging and anomaly detection to identify time-based delays indicative of blind SQL Injection attempts. 5. Keep WordPress core and all plugins updated; apply vendor patches promptly once released for this vulnerability. 6. Consider disabling or removing the vulnerable plugin if AI autotagging is not critical to operations. 7. Use principle of least privilege for all user roles and regularly review user permissions. 8. Educate site administrators and developers about secure coding practices and the risks of SQL Injection. 9. Backup databases regularly to enable recovery in case of data compromise. 10. Engage with the plugin vendor or community to track patch releases and vulnerability disclosures.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13922: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in stevejburge Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI
Description
The Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'existing_terms_orderby' parameter in the AI preview AJAX endpoint in all versions up to, and including, 3.40.1. This is due to insufficient escaping on user-supplied parameters and lack of SQL query parameterization. This makes it possible for authenticated attackers, with Contributor-level access and above who have AI metabox permissions, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database, cause performance degradation, or enable data inference through time-based techniques.
AI-Powered Analysis
Technical Analysis
The vulnerability CVE-2025-13922 affects the 'Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI' WordPress plugin, versions up to and including 3.40.1. It is a time-based blind SQL Injection flaw caused by insufficient escaping and lack of parameterization of the 'existing_terms_orderby' parameter in the AI preview AJAX endpoint. Authenticated attackers with Contributor-level access and AI metabox permissions can inject arbitrary SQL commands appended to legitimate queries. This allows them to extract sensitive information from the database by measuring response times, potentially leading to data leakage. The vulnerability does not require user interaction but does require authentication with specific permissions, limiting the attack surface to insiders or compromised accounts. The flaw does not directly affect data integrity or availability but can cause performance degradation and information disclosure. No patches are currently linked, and no known exploits have been observed in the wild. The CVSS 3.1 score is 6.5 (medium), reflecting network attack vector, low complexity, privileges required, no user interaction, and high confidentiality impact. The vulnerability falls under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command).
Potential Impact
For European organizations, this vulnerability poses a significant risk to WordPress sites using the affected plugin, especially those that allow Contributor-level users to access AI metabox features. Successful exploitation can lead to unauthorized disclosure of sensitive data stored in the WordPress database, including user information, site configuration, or other confidential content. This can result in privacy violations under GDPR and damage organizational reputation. Performance degradation caused by injected queries may disrupt site availability temporarily, impacting business operations and user experience. Since the attack requires authenticated access, insider threats or compromised Contributor accounts are primary concerns. Organizations relying heavily on WordPress for content management and AI tagging functionalities are particularly vulnerable. The lack of current patches increases exposure time, emphasizing the need for immediate mitigation. The medium severity indicates a moderate but actionable threat level.
Mitigation Recommendations
1. Immediately restrict Contributor-level user permissions, especially revoking AI metabox access until a patch is available. 2. Monitor and audit Contributor account activities for unusual behavior or access patterns. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious SQL injection payloads targeting the 'existing_terms_orderby' parameter in AJAX requests. 4. Employ database query logging and anomaly detection to identify time-based delays indicative of blind SQL Injection attempts. 5. Keep WordPress core and all plugins updated; apply vendor patches promptly once released for this vulnerability. 6. Consider disabling or removing the vulnerable plugin if AI autotagging is not critical to operations. 7. Use principle of least privilege for all user roles and regularly review user permissions. 8. Educate site administrators and developers about secure coding practices and the risks of SQL Injection. 9. Backup databases regularly to enable recovery in case of data compromise. 10. Engage with the plugin vendor or community to track patch releases and vulnerability disclosures.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-02T19:52:36.483Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6933b4e62271496a0fa6c3e4
Added to database: 12/6/2025, 4:45:26 AM
Last enriched: 12/6/2025, 5:00:14 AM
Last updated: 12/6/2025, 6:00:50 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14117: Cross-Site Request Forgery in fit2cloud Halo
MediumCVE-2025-13292: CWE-269 Improper Privilege Management in Google Cloud Apigee-X
HighCVE-2025-12505: CWE-285 Improper Authorization in wedevs weDocs: AI Powered Knowledge Base, Docs, Documentation, Wiki & AI Chatbot
MediumCISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
MediumIntellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.