Taskbuilder – Project Management & Task Management Tool With Kanban…

Taskbuilder – Project Management & Task Management Tool With Kanban…

by | Mar 12, 2026 | Plugins

Attack Vectors

CVE-2026-2289 is a Medium severity Stored Cross-Site Scripting (XSS) issue (CVSS 4.4) affecting the Taskbuilder – Project Management & Task Management Tool With Kanban Board WordPress plugin (slug: taskbuilder) up to version 5.0.3.

The attack requires an authenticated user with administrator-level access or higher to inject malicious script into content that is then stored and executed when another user visits the affected page. This means the most likely paths to exploitation are (1) a compromised admin account (phishing, password reuse, malware), (2) a disgruntled insider or contractor with elevated access, or (3) weak governance around who receives administrator permissions.

This vulnerability only affects multisite installations and installations where unfiltered_html has been disabled, which is common in more controlled, compliance-driven environments. Public details: CVE record.

Security Weakness

The root cause is insufficient input sanitization and output escaping. In practical terms, certain fields can accept script-like content and later render it to visitors without safely neutralizing it, enabling a stored (persistent) XSS payload to run in the browser.

Because this is a stored issue, the malicious content can remain embedded until discovered and removed—creating a “set and forget” foothold for the attacker once an admin-level account is used to place the payload.

Technical or Business Impacts

Even though this issue requires administrator privileges, the business impact can still be meaningful: injected scripts can be used to alter what users see, capture session information, perform actions in a user’s browser, or redirect visitors to unwanted destinations. For marketing and executive teams, this can translate into brand damage, loss of customer trust, and campaign disruption (for example, landing pages or project pages displaying unexpected content or redirects).

For compliance and risk owners, stored XSS can become a control failure when it enables unauthorized content changes, user tracking injection, or data exposure through the browser. It can also complicate incident response because the malicious content may execute repeatedly for different users until fully identified and removed.

Remediation: Update Taskbuilder – Project Management & Task Management Tool With Kanban Board to version 5.0.4 or newer (patched). If you operate WordPress multisite and/or have unfiltered_html disabled, prioritize this update and review administrator access assignments and recent admin activity for signs of misuse. Source: Wordfence vulnerability record.

Similar attacks: Stored XSS has historically been used to propagate quickly and impact brand trust at scale, such as the MySpace “Samy” worm, the Twitter onmouseover worm, and the Yammer XSS worm incident (overview).

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers