Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13922: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in stevejburge Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI

0
Medium
VulnerabilityCVE-2025-13922cvecve-2025-13922cwe-89
Published: Sat Dec 06 2025 (12/06/2025, 04:37:50 UTC)
Source: CVE Database V5
Vendor/Project: stevejburge
Product: Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI

Description

The Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'existing_terms_orderby' parameter in the AI preview AJAX endpoint in all versions up to, and including, 3.40.1. This is due to insufficient escaping on user-supplied parameters and lack of SQL query parameterization. This makes it possible for authenticated attackers, with Contributor-level access and above who have AI metabox permissions, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database, cause performance degradation, or enable data inference through time-based techniques.

AI-Powered Analysis

AILast updated: 12/06/2025, 05:00:14 UTC

Technical Analysis

The vulnerability CVE-2025-13922 affects the 'Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI' WordPress plugin, versions up to and including 3.40.1. It is a time-based blind SQL Injection flaw caused by insufficient escaping and lack of parameterization of the 'existing_terms_orderby' parameter in the AI preview AJAX endpoint. Authenticated attackers with Contributor-level access and AI metabox permissions can inject arbitrary SQL commands appended to legitimate queries. This allows them to extract sensitive information from the database by measuring response times, potentially leading to data leakage. The vulnerability does not require user interaction but does require authentication with specific permissions, limiting the attack surface to insiders or compromised accounts. The flaw does not directly affect data integrity or availability but can cause performance degradation and information disclosure. No patches are currently linked, and no known exploits have been observed in the wild. The CVSS 3.1 score is 6.5 (medium), reflecting network attack vector, low complexity, privileges required, no user interaction, and high confidentiality impact. The vulnerability falls under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command).

Potential Impact

For European organizations, this vulnerability poses a significant risk to WordPress sites using the affected plugin, especially those that allow Contributor-level users to access AI metabox features. Successful exploitation can lead to unauthorized disclosure of sensitive data stored in the WordPress database, including user information, site configuration, or other confidential content. This can result in privacy violations under GDPR and damage organizational reputation. Performance degradation caused by injected queries may disrupt site availability temporarily, impacting business operations and user experience. Since the attack requires authenticated access, insider threats or compromised Contributor accounts are primary concerns. Organizations relying heavily on WordPress for content management and AI tagging functionalities are particularly vulnerable. The lack of current patches increases exposure time, emphasizing the need for immediate mitigation. The medium severity indicates a moderate but actionable threat level.

Mitigation Recommendations

1. Immediately restrict Contributor-level user permissions, especially revoking AI metabox access until a patch is available. 2. Monitor and audit Contributor account activities for unusual behavior or access patterns. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious SQL injection payloads targeting the 'existing_terms_orderby' parameter in AJAX requests. 4. Employ database query logging and anomaly detection to identify time-based delays indicative of blind SQL Injection attempts. 5. Keep WordPress core and all plugins updated; apply vendor patches promptly once released for this vulnerability. 6. Consider disabling or removing the vulnerable plugin if AI autotagging is not critical to operations. 7. Use principle of least privilege for all user roles and regularly review user permissions. 8. Educate site administrators and developers about secure coding practices and the risks of SQL Injection. 9. Backup databases regularly to enable recovery in case of data compromise. 10. Engage with the plugin vendor or community to track patch releases and vulnerability disclosures.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-02T19:52:36.483Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6933b4e62271496a0fa6c3e4

Added to database: 12/6/2025, 4:45:26 AM

Last enriched: 12/6/2025, 5:00:14 AM

Last updated: 12/6/2025, 6:00:50 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats