CVE-2025-11972: AI component: SQL Injection exposes database
MEDIUMWordPress sites running TaxoPress (≤3.40.0) with OpenAI integration should patch immediately to 3.41.0+. An authenticated Editor-level attacker can exploit SQL injection in the 'post_types' parameter to exfiltrate database contents—including OpenAI API keys commonly stored in plaintext in WordPress options tables. Patch, then rotate any OpenAI API credentials stored in affected databases.
Risk Assessment
Effective risk is moderate in isolation (CVSS 4.9, high privilege required), but escalates materially in organizations where WordPress Editor roles are broadly assigned, shared, or obtainable via credential stuffing. The primary AI risk vector is exfiltration of OpenAI API credentials from the WordPress database, which converts a medium-severity SQLi into a gateway for unauthorized LLM access, cost harvesting, and downstream data exposure. Not in CISA KEV; no evidence of active exploitation.
Severity & Risk
Attack Surface
Recommended Action
6 steps-
PATCH
Update TaxoPress to 3.41.0+ immediately (fix: commit fd35042).
-
ROTATE
Audit and rotate all OpenAI API keys stored in affected WordPress databases—assume compromise if unpatched instances existed on internet-facing hosts.
-
RESTRICT
Audit and reduce Editor-level role assignments; apply least privilege.
-
HARDEN
Migrate API key storage from WordPress database to environment variables or a secrets manager.
-
DETECT
Review web/database logs for UNION/SELECT patterns in admin AJAX requests targeting TaxoPress endpoints.
-
WAF
Enable SQL injection rules on WordPress admin endpoints via WAF or plugin (e.g., Wordfence).
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2025-11972?
WordPress sites running TaxoPress (≤3.40.0) with OpenAI integration should patch immediately to 3.41.0+. An authenticated Editor-level attacker can exploit SQL injection in the 'post_types' parameter to exfiltrate database contents—including OpenAI API keys commonly stored in plaintext in WordPress options tables. Patch, then rotate any OpenAI API credentials stored in affected databases.
Is CVE-2025-11972 actively exploited?
No confirmed active exploitation of CVE-2025-11972 has been reported, but organizations should still patch proactively.
How to fix CVE-2025-11972?
1. PATCH: Update TaxoPress to 3.41.0+ immediately (fix: commit fd35042). 2. ROTATE: Audit and rotate all OpenAI API keys stored in affected WordPress databases—assume compromise if unpatched instances existed on internet-facing hosts. 3. RESTRICT: Audit and reduce Editor-level role assignments; apply least privilege. 4. HARDEN: Migrate API key storage from WordPress database to environment variables or a secrets manager. 5. DETECT: Review web/database logs for UNION/SELECT patterns in admin AJAX requests targeting TaxoPress endpoints. 6. WAF: Enable SQL injection rules on WordPress admin endpoints via WAF or plugin (e.g., Wordfence).
What systems are affected by CVE-2025-11972?
This vulnerability affects the following AI/ML architecture patterns: WordPress AI plugin deployments, LLM API integrations in CMS platforms, AI-powered content classification pipelines.
What is the CVSS score for CVE-2025-11972?
CVE-2025-11972 has a CVSS v3.1 base score of 4.9 (MEDIUM). The EPSS exploitation probability is 0.03%.
Technical Details
NVD Description
The Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI plugin for WordPress is vulnerable to SQL Injection via the 'post_types' parameter in all versions up to, and including, 3.40.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Editor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Exploitation Scenario
An attacker with Editor credentials—obtained via phishing, credential stuffing against /wp-login.php, or an insider—sends a crafted POST request to the TaxoPress admin AJAX handler with a stacked SQL payload in the 'post_types' parameter. The injected query reads wp_options WHERE option_name='taxopress_openai_settings' (or equivalent), returning the stored OpenAI API key in the response. The attacker then authenticates directly to the OpenAI API using the stolen key, queries models at the victim's expense, extracts any data ingested via the plugin's auto-tagging workflow, or sells the key. Total exploitation time post-authentication: under 5 minutes with public SQLi tooling.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N References
Timeline
Related Vulnerabilities
CVE-2026-21858 10.0 n8n: Input Validation flaw enables exploitation
Same attack type: Data Extraction CVE-2025-53767 10.0 Azure OpenAI: SSRF EoP, no auth required (CVSS 10)
Same attack type: Data Extraction CVE-2023-3765 10.0 MLflow: path traversal allows arbitrary file read
Same attack type: Data Extraction CVE-2025-2828 10.0 LangChain RequestsToolkit: SSRF exposes cloud metadata
Same attack type: Data Extraction GHSA-vvpj-8cmc-gx39 10.0 picklescan: security flaw enables exploitation
Same attack type: Auth Bypass
AI Threat Alert