CVE-2026-42646
Published: 29 April 2026
Summary
CVE-2026-42646 is a high-severity SQL Injection (CWE-89) vulnerability. Its CVSS base score is 7.6 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Databases (T1213.006); ranked at the 10.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates blind SQL injection in TaxoPress by validating and sanitizing user inputs before they are used in SQL commands.
Remediates the specific SQL injection flaw in TaxoPress versions through <=3.44.0 by identifying, testing, and applying vendor-provided patches.
Provides defense-in-depth against network-accessible SQL injection exploitation via boundary protections like web application firewalls that block malicious payloads.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Blind SQL injection in the WordPress plugin directly enables querying and extracting sensitive data from the database (high confidentiality impact), mapping to Data from Information Repositories (Databases).
NVD Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Steve Burge TaxoPress simple-tags allows Blind SQL Injection.This issue affects TaxoPress: from n/a through <= 3.44.0.
Deeper analysisAI
CVE-2026-42646 is an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability, specifically enabling Blind SQL Injection, in the Steve Burge TaxoPress simple-tags WordPress plugin. This issue affects TaxoPress versions from n/a through <= 3.44.0. The vulnerability carries a CVSS v3.1 base score of 7.6 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L) and is associated with CWE-89.
Exploitation requires high privileges (PR:H), such as those of an authenticated administrator, but is network accessible (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Attackers can achieve high confidentiality impact (C:H) with a changed scope (S:C), potentially extracting sensitive data from the database via blind SQL injection techniques, alongside low availability impact (A:L) and no integrity impact (I:N).
The Patchstack advisory (https://patchstack.com/database/Wordpress/Plugin/simple-tags/vulnerability/wordpress-taxopress-plugin-3-44-0-sql-injection-vulnerability?_s_id=cve) documents this SQL injection vulnerability in the WordPress TaxoPress plugin version 3.44.0.
Details
- CWE(s)