CVE-2026-2289
Stored XSS in WordPress Taskbuilder Plugin Allows Admin Script Injection
Publication date: 2026-03-04
Last updated on: 2026-03-04
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordfence | taskbuilder | 5.0.3 |
| wordfence | taskbuilder | 5.0.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The Taskbuilder plugin for WordPress has a Stored Cross-Site Scripting (XSS) vulnerability in all versions up to and including 5.0.3. This vulnerability arises because the plugin does not properly sanitize input or escape output in its admin settings. As a result, an authenticated attacker with administrator-level permissions or higher can inject arbitrary web scripts into pages. These scripts execute whenever a user accesses the injected page. This vulnerability specifically affects multi-site WordPress installations or installations where the unfiltered_html capability has been disabled.
How can this vulnerability impact me? :
This vulnerability allows an attacker with administrator-level access to inject malicious scripts that execute in the context of other users visiting the affected pages. The impact includes the potential for attackers to steal sensitive information, hijack user sessions, perform unauthorized actions on behalf of users, or spread malware. Since the vulnerability is stored, the malicious script persists and affects any user who accesses the infected page. The CVSS score of 4.4 indicates a moderate severity with network attack vector, high attack complexity, and requiring high privileges but no user interaction.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
The vulnerability affects the Taskbuilder WordPress plugin versions up to and including 5.0.3, specifically in multi-site installations or where unfiltered_html is disabled. Detection involves verifying the plugin version and configuration.
To detect if your system is vulnerable, you can check the installed version of the Taskbuilder plugin and confirm if it is 5.0.3 or earlier. Additionally, verify if your WordPress installation is multi-site or if the unfiltered_html capability is disabled.
Suggested commands to detect the vulnerability include:
- Check the installed Taskbuilder plugin version via WP-CLI: `wp plugin get taskbuilder --field=version`
- Check if the WordPress installation is multi-site: `wp core is-installed && wp option get siteurl && wp site list` (multi-site will list multiple sites)
- Check if the unfiltered_html capability is disabled for administrators by inspecting user roles and capabilities, e.g., via WP-CLI or custom scripts.
Since the vulnerability requires administrator-level permissions to exploit, monitoring for suspicious changes in admin settings or injected scripts in admin pages may also help detect exploitation attempts.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include:
- Upgrade the Taskbuilder plugin to version 5.0.4 or later, as the update includes extensive changes likely addressing this vulnerability.
- Restrict administrator-level access to trusted users only, since exploitation requires authenticated users with admin permissions.
- If upgrading immediately is not possible, consider disabling the Taskbuilder plugin temporarily, especially on multi-site installations or where unfiltered_html is disabled.
- Monitor admin settings pages and logs for suspicious script injections or unauthorized changes.
Applying these steps will reduce the risk of exploitation of the stored cross-site scripting vulnerability.