CVE-2025-14371
MEDIUMA missing authorization check in the WordPress AI Autotagger plugin (OpenAI integration) lets any authenticated Contributor silently manipulate tags and categories across all site posts—including posts they don't own. Patch to 3.41.1+ immediately. The OpenAI API component itself is not exploited; risk is content integrity, not model compromise or data breach.
Severity & Risk
Recommended Action
- 1. Patch immediately: upgrade the Tag, Category, and Taxonomy Manager plugin to 3.41.1 or later. 2. If patching is delayed, audit Contributor role assignments and revoke unnecessary accounts. 3. Enable WordPress activity logging (e.g., WP Activity Log) and alert on bulk taxonomy changes outside normal editorial hours. 4. Audit downstream AI pipelines that ingest WordPress taxonomy metadata—validate data integrity and re-index if manipulation is suspected. 5. Enforce least-privilege by restricting Contributor access to AI taxonomy features via a role-management plugin until the patch is applied.
Classification
Compliance Impact
This CVE is relevant to:
Technical Details
NVD Description
The Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the taxopress_ai_add_post_term function in all versions up to, and including, 3.41.0. This makes it possible for authenticated attackers, with Contributor-level access and above, to add or remove taxonomy terms (tags, categories) on any post, including ones they do not own.
Exploitation Scenario
An attacker registers or compromises a Contributor account on a target WordPress site running the vulnerable plugin. With no AI expertise required, they craft a direct POST to the taxopress_ai_add_post_term AJAX endpoint, targeting arbitrary post IDs to inject misleading tags or strip accurate categories from high-traffic or compliance-sensitive content. If the site uses a RAG pipeline that ingests WordPress taxonomy for content retrieval or classification, the attacker's poisoned taxonomy silently degrades retrieval relevance over weeks—going undetected until a content audit or user complaint surfaces the manipulation. The attack leaves no obvious footprint in standard WordPress logs unless activity monitoring is enabled.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N