CVE-2025-32598

7.1 HIGH

📋 TL;DR

This vulnerability allows attackers to inject malicious scripts into web pages generated by WP Table Builder, which are then executed in victims' browsers when they visit compromised pages. It affects all WordPress sites using WP Table Builder plugin versions up to 2.0.4. Attackers can steal session cookies, redirect users, or perform actions on their behalf.

💻 Affected Systems

Products:
  • WP Table Builder WordPress Plugin
Versions: All versions up to and including 2.0.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with vulnerable plugin versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal administrator session cookies, gain full control of WordPress site, install backdoors, deface website, or steal sensitive user data.

🟠

Likely Case

Attackers steal user session cookies, redirect visitors to malicious sites, or perform limited actions within the victim's WordPress session.

🟢

If Mitigated

Script execution is blocked by browser security features or Content Security Policy, limiting damage to session hijacking attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS vulnerabilities are commonly exploited and require minimal technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.5 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/wp-table-builder/vulnerability/wordpress-wp-table-builder-plugin-2-0-4-cross-site-scripting-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find WP Table Builder and click 'Update Now'. 4. Verify plugin version is 2.0.5 or higher.

🔧 Temporary Workarounds

Disable WP Table Builder Plugin

all

Temporarily disable the vulnerable plugin until patched.

wp plugin deactivate wp-table-builder

Implement Content Security Policy

all

Add CSP headers to block inline script execution.

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Add to nginx config: add_header Content-Security-Policy "default-src 'self'; script-src 'self'";

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) rules to block XSS payloads in requests.
  • Restrict plugin access to trusted users only using WordPress role management.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for WP Table Builder version.

Check Version:

wp plugin get wp-table-builder --field=version

Verify Fix Applied:

Verify WP Table Builder version is 2.0.5 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual GET/POST requests containing script tags or JavaScript code to WP Table Builder endpoints.
  • Multiple failed login attempts following suspicious requests.

Network Indicators:

  • HTTP requests with suspicious parameters containing <script>, javascript:, or encoded payloads.

SIEM Query:

source="*access.log*" AND ("wp-table-builder" OR "wptb_") AND ("<script" OR "javascript:" OR "%3Cscript" OR "%22onload%22")

🔗 References

📤 Share & Export