CVE-2024-35635

4.4 MEDIUM

📋 TL;DR

This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in the Ninja Tables WordPress plugin by WPManageNinja LLC. It allows attackers to make unauthorized requests from the vulnerable server to internal or external systems. WordPress sites using affected versions of Ninja Tables are vulnerable.

💻 Affected Systems

Products:
  • Ninja Tables WordPress Plugin
Versions: All versions up to and including 5.0.9
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the Ninja Tables plugin to be installed and activated on a WordPress site.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, perform port scanning, interact with cloud metadata services, or chain with other vulnerabilities to achieve remote code execution.

🟠

Likely Case

Information disclosure from internal services, limited internal network reconnaissance, or abuse of server resources for external attacks.

🟢

If Mitigated

Limited impact if network segmentation restricts server outbound connections and internal services require authentication.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation likely requires some level of WordPress user access, though specific authentication requirements aren't detailed in available references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.1.0 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/ninja-tables/wordpress-ninja-tables-plugin-5-0-9-server-side-request-forgery-ssrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Ninja Tables and click 'Update Now'. 4. Verify version is 5.1.0 or higher.

🔧 Temporary Workarounds

Disable Ninja Tables Plugin

all

Temporarily deactivate the vulnerable plugin until patching is possible.

wp plugin deactivate ninja-tables

Network Restriction

linux

Restrict outbound HTTP/HTTPS requests from the web server to only necessary destinations.

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block SSRF patterns in requests
  • Restrict server outbound network access using firewall rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Ninja Tables version. If version is 5.0.9 or lower, the site is vulnerable.

Check Version:

wp plugin get ninja-tables --field=version

Verify Fix Applied:

After updating, confirm Ninja Tables version is 5.1.0 or higher in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from web server to internal IPs or unexpected domains
  • Multiple rapid requests to different internal endpoints from same source

Network Indicators:

  • Web server making unexpected HTTP requests to internal network segments
  • Requests to cloud metadata services (169.254.169.254, etc.)

SIEM Query:

source="web_server_logs" AND (uri CONTAINS "ninja-tables" OR user_agent CONTAINS "NinjaTables") AND (status_code=200 OR status_code=302) AND (dst_ip IN internal_ranges OR dst_ip=169.254.169.254)

🔗 References

📤 Share & Export