CVE-2025-14371

MEDIUM
Published January 6, 2026
CISO Take

A missing authorization check in the WordPress AI Autotagger plugin (OpenAI integration) lets any authenticated Contributor silently manipulate tags and categories across all site posts—including posts they don't own. Patch to 3.41.1+ immediately. The OpenAI API component itself is not exploited; risk is content integrity, not model compromise or data breach.

Severity & Risk

CVSS 3.1
4.3 / 10
EPSS
N/A
KEV Status
Not in KEV
Sophistication
Trivial

Recommended Action

  1. 1. Patch immediately: upgrade the Tag, Category, and Taxonomy Manager plugin to 3.41.1 or later. 2. If patching is delayed, audit Contributor role assignments and revoke unnecessary accounts. 3. Enable WordPress activity logging (e.g., WP Activity Log) and alert on bulk taxonomy changes outside normal editorial hours. 4. Audit downstream AI pipelines that ingest WordPress taxonomy metadata—validate data integrity and re-index if manipulation is suspected. 5. Enforce least-privilege by restricting Contributor access to AI taxonomy features via a role-management plugin until the patch is applied.

Classification

Compliance Impact

This CVE is relevant to:

EU AI Act
Art. 15 - Accuracy, robustness and cybersecurity Art. 9 - Risk Management System
ISO 42001
A.6.2 - AI System Roles and Responsibilities
NIST AI RMF
GOVERN 6.1 - Policies and procedures for defining and differentiating roles in human-AI configurations
OWASP LLM Top 10
LLM07 - Insecure Plugin Design LLM07:2023 - Insecure Plugin Design

Technical Details

NVD Description

The Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the taxopress_ai_add_post_term function in all versions up to, and including, 3.41.0. This makes it possible for authenticated attackers, with Contributor-level access and above, to add or remove taxonomy terms (tags, categories) on any post, including ones they do not own.

Exploitation Scenario

An attacker registers or compromises a Contributor account on a target WordPress site running the vulnerable plugin. With no AI expertise required, they craft a direct POST to the taxopress_ai_add_post_term AJAX endpoint, targeting arbitrary post IDs to inject misleading tags or strip accurate categories from high-traffic or compliance-sensitive content. If the site uses a RAG pipeline that ingests WordPress taxonomy for content retrieval or classification, the attacker's poisoned taxonomy silently degrades retrieval relevance over weeks—going undetected until a content audit or user complaint surfaces the manipulation. The attack leaves no obvious footprint in standard WordPress logs unless activity monitoring is enabled.

Weaknesses (CWE)

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Timeline

Published
January 6, 2026
Last Modified
January 8, 2026
First Seen
January 6, 2026