Home

Description

The TableMaster for Elementor plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.3.6. This is due to the plugin not restricting which URLs can be fetched when importing CSV data from a URL in the Data Table widget. This makes it possible for authenticated attackers, with Author-level access and above, to make web requests to arbitrary locations, including localhost and internal network services, and read sensitive files such as wp-config.php via the 'csv_url' parameter.

PUBLISHED Reserved 2025-12-12 | Published 2026-01-28 | Updated 2026-01-28 | Assigner Wordfence




HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

Problem types

CWE-918 Server-Side Request Forgery (SSRF)

Product status

Default status
unaffected

* (semver)
affected

Timeline

2026-01-05:Vendor Notified
2026-01-27:Disclosed

Credits

Athiwat Tiprasaharn finder

Itthidej Aramsri finder

Powpy finder

Waris Damkham finder

Varakorn Chanthasri finder

Peerapat Samatathanyakorn finder

Sopon Tangpathum (SoNaJaa) finder

References

www.wordfence.com/...-ccdb-4b33-817f-6d4b3ad96243?source=cve

plugins.trac.wordpress.org/...a-table/widgets/data-table.php

plugins.trac.wordpress.org/...a-table/widgets/data-table.php

plugins.trac.wordpress.org/...lementor&sfp_email=&sfph_mail=

cve.org (CVE-2025-14610)

nvd.nist.gov (CVE-2025-14610)

Download JSON