Description
The Table Manager plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0.0 via the 'table_manager' shortcode. The shortcode handler `tablemanager_render_table_shortcode()` takes a user-controlled `table` attribute, applies only `sanitize_key()` for sanitization, and concatenates the value with `$wpdb->prefix` to form a full database table name. It then executes `DESC` and `SELECT *` queries against this table and renders all rows and columns to the frontend. There is no allowlist check to ensure only plugin-created tables can be accessed — the `tablemanager_created_tables` option is only referenced in admin functions, never in the shortcode handler. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data from arbitrary WordPress database tables.
Problem types
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Product status
Any version
Timeline
| 2026-04-21: | Disclosed |
Credits
Itthidej Aramsri
References
www.wordfence.com/...-f99e-4359-8228-0f3452f80aac?source=cve
plugins.trac.wordpress.org/...anager/trunk/table-manager.php
plugins.trac.wordpress.org/...r/tags/1.0.0/table-manager.php
plugins.trac.wordpress.org/...anager/trunk/table-manager.php
plugins.trac.wordpress.org/...r/tags/1.0.0/table-manager.php
plugins.trac.wordpress.org/...anager/trunk/table-manager.php
plugins.trac.wordpress.org/...r/tags/1.0.0/table-manager.php