CVE-2025-14610

7.2 HIGH

📋 TL;DR

The TableMaster for Elementor WordPress plugin has a Server-Side Request Forgery (SSRF) vulnerability that allows authenticated attackers with Author-level permissions or higher to make arbitrary web requests. This enables them to access internal network services, localhost resources, and read sensitive files like wp-config.php through the csv_url parameter when importing CSV data.

💻 Affected Systems

Products:
  • TableMaster for Elementor WordPress plugin
Versions: All versions up to and including 1.3.6
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with TableMaster for Elementor plugin installed and at least one user with Author-level permissions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive configuration files (wp-config.php containing database credentials), access internal services, perform port scanning, or pivot to attack other internal systems.

🟠

Likely Case

Unauthorized access to WordPress configuration files leading to database compromise, privilege escalation, or data exfiltration.

🟢

If Mitigated

Limited to authenticated Author-level users only, preventing unauthenticated attacks but still allowing privilege escalation from lower privileged accounts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires Author-level WordPress credentials but is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.3.6

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3442158%40tablemaster-for-elementor&new=3442158%40tablemaster-for-elementor&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find TableMaster for Elementor. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable CSV URL Import

all

Remove or restrict the csv_url parameter functionality in the Data Table widget

Edit wp-content/plugins/tablemaster-for-elementor/modules/data-table/widgets/data-table.php and comment out lines around 446

Restrict User Permissions

all

Limit Author-level permissions or review user accounts with elevated access

Review WordPress user roles and capabilities, consider using plugins like Members or User Role Editor

🧯 If You Can't Patch

  • Immediately restrict or remove Author-level user accounts
  • Implement network segmentation to isolate WordPress server from internal services

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → TableMaster for Elementor → Version. If version is 1.3.6 or lower, you are vulnerable.

Check Version:

wp plugin list --name=tablemaster-for-elementor --field=version

Verify Fix Applied:

Verify plugin version is higher than 1.3.6 and test CSV URL import functionality with restricted URLs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to wp-admin/admin-ajax.php with csv_url parameter
  • Multiple failed CSV import attempts with unusual URLs
  • Requests to localhost or internal IPs from WordPress server

Network Indicators:

  • Outbound HTTP requests from WordPress server to internal network segments
  • Port scanning activity originating from WordPress server

SIEM Query:

source="wordpress.log" AND ("csv_url" OR "tablemaster") AND ("localhost" OR "127.0.0.1" OR "192.168." OR "10." OR "172.16.")

🔗 References

📤 Share & Export