Security programs Bounty leaderboard API Protect

WordPress Tatsu Plugin < 3.3.13 is vulnerable to Remote Code Execution (RCE)

Patch immediately High priority
Known to be exploited Active attempts logged
High severity CVSS 3.1 score

Protect your sites with automated security

Enable Protection



Update the WordPress Tatsu plugin to the latest available version (at least 3.3.13).

Vincent Michel discovered and reported this Remote Code Execution (RCE) vulnerability in WordPress Tatsu Plugin. This could allow a malicious actor to execute commands on the target website. This can be used to gain backdoor access to then take full control of the website. This vulnerability has been fixed in version 3.3.13.

No other known vulnerabilities for this plugin


WordPress plugin developer?

Start a free security program for your WordPress plugins or request an audit.

Apply for MVDP

Security researcher?

Report to Patchstack Alliance bounty platform and earn monthly cash prizes.

Learn more

Let us know if we have missed a vulnerability reported elsewhere

Report arrow right Close

Thank you for contributing!

Successfully submit vulnerabilities and receive an invite to our Alliance platform.

Learn more arrow right Close