Home

Description

The Table Manager plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0.0 via the 'table_manager' shortcode. The shortcode handler `tablemanager_render_table_shortcode()` takes a user-controlled `table` attribute, applies only `sanitize_key()` for sanitization, and concatenates the value with `$wpdb->prefix` to form a full database table name. It then executes `DESC` and `SELECT *` queries against this table and renders all rows and columns to the frontend. There is no allowlist check to ensure only plugin-created tables can be accessed — the `tablemanager_created_tables` option is only referenced in admin functions, never in the shortcode handler. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data from arbitrary WordPress database tables.

PUBLISHED Reserved 2026-03-13 | Published 2026-04-22 | Updated 2026-04-22 | Assigner Wordfence




MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

Product status

Default status
unaffected

Any version
affected

Timeline

2026-04-21:Disclosed

Credits

Itthidej Aramsri finder

References

www.wordfence.com/...-f99e-4359-8228-0f3452f80aac?source=cve

plugins.trac.wordpress.org/...anager/trunk/table-manager.php

plugins.trac.wordpress.org/...r/tags/1.0.0/table-manager.php

plugins.trac.wordpress.org/...anager/trunk/table-manager.php

plugins.trac.wordpress.org/...r/tags/1.0.0/table-manager.php

plugins.trac.wordpress.org/...anager/trunk/table-manager.php

plugins.trac.wordpress.org/...r/tags/1.0.0/table-manager.php

cve.org (CVE-2026-4126)

nvd.nist.gov (CVE-2026-4126)

Download JSON