CVE-2026-2289
Received Received - Intake
Stored XSS in WordPress Taskbuilder Plugin Allows Admin Script Injection

Publication date: 2026-03-04

Last updated on: 2026-03-04

Assigner: Wordfence

Description
The Taskbuilder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 5.0.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-04
Last Modified
2026-03-04
Generated
2026-05-07
AI Q&A
2026-03-04
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
wordfence taskbuilder 5.0.3
wordfence taskbuilder 5.0.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The Taskbuilder plugin for WordPress has a Stored Cross-Site Scripting (XSS) vulnerability in all versions up to and including 5.0.3. This vulnerability arises because the plugin does not properly sanitize input or escape output in its admin settings. As a result, an authenticated attacker with administrator-level permissions or higher can inject arbitrary web scripts into pages. These scripts execute whenever a user accesses the injected page. This vulnerability specifically affects multi-site WordPress installations or installations where the unfiltered_html capability has been disabled.


How can this vulnerability impact me? :

This vulnerability allows an attacker with administrator-level access to inject malicious scripts that execute in the context of other users visiting the affected pages. The impact includes the potential for attackers to steal sensitive information, hijack user sessions, perform unauthorized actions on behalf of users, or spread malware. Since the vulnerability is stored, the malicious script persists and affects any user who accesses the infected page. The CVSS score of 4.4 indicates a moderate severity with network attack vector, high attack complexity, and requiring high privileges but no user interaction.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

The vulnerability affects the Taskbuilder WordPress plugin versions up to and including 5.0.3, specifically in multi-site installations or where unfiltered_html is disabled. Detection involves verifying the plugin version and configuration.

To detect if your system is vulnerable, you can check the installed version of the Taskbuilder plugin and confirm if it is 5.0.3 or earlier. Additionally, verify if your WordPress installation is multi-site or if the unfiltered_html capability is disabled.

Suggested commands to detect the vulnerability include:

  • Check the installed Taskbuilder plugin version via WP-CLI: `wp plugin get taskbuilder --field=version`
  • Check if the WordPress installation is multi-site: `wp core is-installed && wp option get siteurl && wp site list` (multi-site will list multiple sites)
  • Check if the unfiltered_html capability is disabled for administrators by inspecting user roles and capabilities, e.g., via WP-CLI or custom scripts.

Since the vulnerability requires administrator-level permissions to exploit, monitoring for suspicious changes in admin settings or injected scripts in admin pages may also help detect exploitation attempts.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include:

  • Upgrade the Taskbuilder plugin to version 5.0.4 or later, as the update includes extensive changes likely addressing this vulnerability.
  • Restrict administrator-level access to trusted users only, since exploitation requires authenticated users with admin permissions.
  • If upgrading immediately is not possible, consider disabling the Taskbuilder plugin temporarily, especially on multi-site installations or where unfiltered_html is disabled.
  • Monitor admin settings pages and logs for suspicious script injections or unauthorized changes.

Applying these steps will reduce the risk of exploitation of the stored cross-site scripting vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart