Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2289: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in taskbuilder Taskbuilder – Project Management & Task Management Tool With Kanban Board

0
Medium
VulnerabilityCVE-2026-2289cvecve-2026-2289cwe-79
Published: Wed Mar 04 2026 (03/04/2026, 01:21:58 UTC)
Source: CVE Database V5
Vendor/Project: taskbuilder
Product: Taskbuilder – Project Management & Task Management Tool With Kanban Board

Description

CVE-2026-2289 is a stored cross-site scripting (XSS) vulnerability in the Taskbuilder WordPress plugin, affecting all versions up to 5. 0. 3. It allows authenticated administrators to inject malicious scripts via admin settings, which execute when users access the compromised pages. This vulnerability specifically impacts multi-site WordPress installations or those with unfiltered_html disabled. Exploitation requires high privileges and no user interaction, with a medium CVSS score of 4. 4. Although no known exploits are reported in the wild, the vulnerability poses risks to confidentiality and integrity by enabling script injection. Organizations using Taskbuilder in multi-site environments should prioritize patching or mitigating this issue to prevent potential attacks. The threat primarily affects countries with significant WordPress usage and adoption of the Taskbuilder plugin in multi-site configurations.

AI-Powered Analysis

AILast updated: 03/04/2026, 02:19:26 UTC

Technical Analysis

CVE-2026-2289 is a stored cross-site scripting (XSS) vulnerability identified in the Taskbuilder plugin for WordPress, a project management and task management tool featuring a Kanban board. The vulnerability exists due to improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of administrator-supplied input in the plugin's settings interface. This flaw allows an attacker with administrator-level privileges to inject arbitrary JavaScript code into pages generated by the plugin. The injected scripts execute in the context of any user who accesses the affected pages, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the WordPress environment. The vulnerability affects all versions up to and including 5.0.3 and is limited to multi-site WordPress installations or those where the unfiltered_html capability is disabled, which restricts HTML content filtering. The CVSS v3.1 base score is 4.4, reflecting a medium severity level, with attack vector network, high attack complexity, required privileges at the administrator level, no user interaction needed, and a scope change. No public exploits have been reported yet. The vulnerability is tracked under CWE-79, indicating improper neutralization of input leading to XSS. Since the vulnerability requires administrator privileges, the attack surface is limited to insiders or compromised admin accounts, but the impact on confidentiality and integrity is significant due to script execution in user browsers.

Potential Impact

The primary impact of CVE-2026-2289 is the potential compromise of user sessions and data confidentiality within affected WordPress sites using the Taskbuilder plugin in multi-site configurations. An attacker with administrator privileges can inject malicious scripts that execute in the browsers of users visiting the compromised pages, potentially enabling theft of authentication cookies, unauthorized actions on behalf of users, or distribution of malware. This can lead to data breaches, defacement, or further compromise of the WordPress environment. Although the vulnerability does not directly affect availability, the integrity and confidentiality of site data and user information are at risk. Organizations relying on Taskbuilder for project management may face operational disruptions and reputational damage if exploited. The requirement for administrator-level access limits the threat to insider threats or attackers who have already gained elevated privileges, but it remains critical to address to prevent lateral movement and privilege abuse within WordPress multi-site installations.

Mitigation Recommendations

To mitigate CVE-2026-2289, organizations should first update the Taskbuilder plugin to a version that addresses this vulnerability once available. In the absence of a patch, administrators should restrict access to the WordPress admin interface to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of compromised admin accounts. Additionally, review and limit the use of multi-site WordPress installations where possible, or ensure that the unfiltered_html capability is carefully managed and only granted to trusted users. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Regularly audit and sanitize all administrator inputs in the plugin settings manually if feasible. Monitoring for unusual administrative activity and employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injections can provide additional protection. Finally, educate administrators about the risks of XSS and the importance of secure input handling.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-10T15:17:13.447Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a79342d1a09e29cbc204dd

Added to database: 3/4/2026, 2:04:50 AM

Last enriched: 3/4/2026, 2:19:26 AM

Last updated: 3/4/2026, 5:46:18 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses