Vulnerability Description
The TP Restore Categories And Taxonomies plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.0.1. The delete_term() function, which handles the 'tpmcattt_delete_term' AJAX action, does not perform any capability check (e.g., current_user_can()) to verify the user has sufficient permissions. While it does verify a nonce via check_ajax_referer(), this nonce is generated for all authenticated users via the admin_enqueue_scripts hook and exposed on any wp-admin page (including profile.php, which subscribers can access). This makes it possible for authenticated attackers, with Subscriber-level access and above, to permanently delete taxonomy term records from the plugin's trash/backup tables by sending a crafted AJAX request with a valid nonce and an arbitrary term_id.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/tp-restore-categories-and-taxonomies/
- https://plugins.trac.wordpress.org/browser/tp-restore-categories-and-taxonomies/
- https://plugins.trac.wordpress.org/browser/tp-restore-categories-and-taxonomies/
- https://plugins.trac.wordpress.org/browser/tp-restore-categories-and-taxonomies/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/53a0749f-86e9-4f62-9de
FAQ
What is CVE-2026-4128?
CVE-2026-4128 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The TP Restore Categories And Taxonomies plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.0.1. The delete_term() function, which handles the 'tpmcatt...
How severe is CVE-2026-4128?
CVE-2026-4128 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-4128?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.