CVE-2025-14610
📋 TL;DR
The TableMaster for Elementor WordPress plugin has a Server-Side Request Forgery (SSRF) vulnerability that allows authenticated attackers with Author-level permissions or higher to make arbitrary web requests. This enables them to access internal network services, localhost resources, and read sensitive files like wp-config.php through the csv_url parameter when importing CSV data.
💻 Affected Systems
- TableMaster for Elementor WordPress plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could read sensitive configuration files (wp-config.php containing database credentials), access internal services, perform port scanning, or pivot to attack other internal systems.
Likely Case
Unauthorized access to WordPress configuration files leading to database compromise, privilege escalation, or data exfiltration.
If Mitigated
Limited to authenticated Author-level users only, preventing unauthenticated attacks but still allowing privilege escalation from lower privileged accounts.
🎯 Exploit Status
Exploitation requires Author-level WordPress credentials but is straightforward once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 1.3.6
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find TableMaster for Elementor. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress repository and manually update.
🔧 Temporary Workarounds
Disable CSV URL Import
allRemove or restrict the csv_url parameter functionality in the Data Table widget
Edit wp-content/plugins/tablemaster-for-elementor/modules/data-table/widgets/data-table.php and comment out lines around 446
Restrict User Permissions
allLimit Author-level permissions or review user accounts with elevated access
Review WordPress user roles and capabilities, consider using plugins like Members or User Role Editor
🧯 If You Can't Patch
- Immediately restrict or remove Author-level user accounts
- Implement network segmentation to isolate WordPress server from internal services
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → TableMaster for Elementor → Version. If version is 1.3.6 or lower, you are vulnerable.
Check Version:
wp plugin list --name=tablemaster-for-elementor --field=version
Verify Fix Applied:
Verify plugin version is higher than 1.3.6 and test CSV URL import functionality with restricted URLs.
📡 Detection & Monitoring
Log Indicators:
- Unusual requests to wp-admin/admin-ajax.php with csv_url parameter
- Multiple failed CSV import attempts with unusual URLs
- Requests to localhost or internal IPs from WordPress server
Network Indicators:
- Outbound HTTP requests from WordPress server to internal network segments
- Port scanning activity originating from WordPress server
SIEM Query:
source="wordpress.log" AND ("csv_url" OR "tablemaster") AND ("localhost" OR "127.0.0.1" OR "192.168." OR "10." OR "172.16.")
🔗 References
- https://plugins.trac.wordpress.org/browser/tablemaster-for-elementor/tags/1.3.6/modules/data-table/widgets/data-table.php#L446
- https://plugins.trac.wordpress.org/browser/tablemaster-for-elementor/trunk/modules/data-table/widgets/data-table.php#L446
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3442158%40tablemaster-for-elementor&new=3442158%40tablemaster-for-elementor&sfp_email=&sfph_mail=
- https://www.wordfence.com/threat-intel/vulnerabilities/id/ef07d6b0-ccdb-4b33-817f-6d4b3ad96243?source=cve