MDTF – Meta Data and Taxonomies Filter Vulnerability (Medium) – CVE…

MDTF – Meta Data and Taxonomies Filter Vulnerability (Medium) – CVE…

by | Mar 19, 2026 | Plugins

Attack Vectors

CVE-2026-32455 is a Medium-severity vulnerability (CVSS 6.4, CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N) affecting the MDTF – Meta Data and Taxonomies Filter WordPress plugin (slug: wp-meta-data-filter-and-taxonomy-filter) in versions up to and including 1.3.5.

The attack requires an authenticated WordPress account with Contributor-level access or higher. A malicious user can inject a script payload that becomes stored in your site content, meaning it can execute later when other users load the affected page(s). Because the vulnerability is reachable over the network and does not require the victim to click anything specific (per the CVSS characteristics), it can create risk for administrators and other logged-in users who routinely review content.

Typical real-world entry points for this kind of issue include user-editable fields associated with plugin features (such as filters, labels, settings, or displayed metadata) where content is saved and later rendered on the front end or in the WordPress dashboard.

Security Weakness

This issue is a Stored Cross-Site Scripting (Stored XSS) vulnerability caused by insufficient input sanitization and output escaping in the MDTF – Meta Data and Taxonomies Filter plugin (versions ≤ 1.3.5). In practical terms, the plugin does not consistently clean untrusted input when it is saved and/or does not safely encode it when it is displayed.

Stored XSS is particularly important for business stakeholders because it turns your website into a delivery mechanism for attacker-controlled scripts—potentially targeting employees (admin users, content teams) and customers (site visitors), depending on where the injected content is rendered.

Remediation: Update MDTF – Meta Data and Taxonomies Filter to version 1.3.6 or a newer patched version. The public advisory and additional context are available from Wordfence: Wordfence vulnerability record.

Technical or Business Impacts

If exploited, Stored XSS can allow an attacker to run JavaScript in the browser of anyone viewing the affected page. For leadership, the risk is less about “a bug in a plugin” and more about what that script can do in a business context—especially when it executes in an authenticated user’s session.

Potential impacts include:

Account and session abuse: If an administrator or editor loads an injected page, the script may be able to perform actions in the context of that logged-in user (depending on browser protections and site configuration), raising the risk of unauthorized changes to content, settings, or user management workflows.

Brand and customer trust damage: Visitors could be redirected, shown fake forms, or exposed to unwanted pop-ups. Even brief incidents can lead to reputational harm, support volume spikes, and reduced conversion rates.

Compliance and governance exposure: If the injected script is used for data collection (for example, capturing form inputs), it can create incident response obligations and potential regulatory scrutiny depending on the type of data involved and your applicable standards.

Operational disruption: Marketing and content teams may need to halt publishing, roll back pages, and conduct urgent reviews of contributor access while remediation and cleanup occur—delaying campaigns and increasing internal workload.

Similar Attacks

Stored XSS has a long history of causing real-world business impact. Notable examples include:

The “Samy” MySpace worm (2005), a classic case of stored XSS rapidly self-propagating across user profiles and demonstrating how quickly trust and platform integrity can be undermined.

Documented notable cross-site scripting incidents, which highlight how XSS has repeatedly been used to deface pages, hijack sessions, and manipulate user interactions on high-traffic websites.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers