CVE-2024-23825: CWE-918: Server-Side Request Forgery (SSRF) in TablePress TablePress
TablePress is a table plugin for Wordpress. For importing tables, TablePress makes external HTTP requests based on a URL that is provided by the user. That user input is filtered insufficiently, which makes it is possible to send requests to unintended network locations and receive responses. On sites in a cloud environment like AWS, an attacker can potentially make GET requests to the instance's metadata REST API. If the instance's configuration is insecure, this can lead to the exposure of internal data, including credentials. This vulnerability is fixed in 2.2.5.
AI Analysis
Technical Summary
CVE-2024-23825 is a Server-Side Request Forgery (SSRF) vulnerability identified in the TablePress plugin for WordPress, specifically in versions prior to 2.2.5. TablePress allows users to import tables by specifying a URL from which the plugin fetches data via HTTP requests. The vulnerability arises due to insufficient filtering and validation of the user-supplied URL input. This flaw enables an attacker to craft malicious URLs that cause the server hosting the WordPress site to send HTTP GET requests to unintended internal or external network locations. In cloud environments such as AWS, this can be particularly dangerous because an attacker might exploit the SSRF to query the instance metadata REST API, which often contains sensitive information like temporary credentials, configuration details, or tokens. If the cloud instance is misconfigured or overly permissive, this can lead to unauthorized disclosure of internal data. The vulnerability does not require user interaction but does require some level of privileges (as indicated by CVSS vector PR:H), which suggests that the attacker needs authenticated access to exploit it. The CVSS v3.1 base score is 3.0, indicating a low severity primarily due to the high attack complexity and required privileges. The vulnerability affects confidentiality but does not impact integrity or availability. No known exploits are currently reported in the wild, and the issue is resolved in TablePress version 2.2.5. The vulnerability is classified under CWE-918 (Server-Side Request Forgery).
Potential Impact
For European organizations using WordPress sites with the TablePress plugin versions earlier than 2.2.5, this vulnerability poses a risk of unauthorized internal network reconnaissance and potential data leakage. In cloud-hosted environments, especially those using AWS, the SSRF could allow attackers to access sensitive instance metadata, potentially exposing credentials that could be leveraged for further lateral movement or privilege escalation within the cloud infrastructure. This could lead to breaches of confidentiality and compromise of internal systems. Although the CVSS score is low, the impact can be significant if combined with other vulnerabilities or misconfigurations. Organizations relying on TablePress for public-facing or internal portals should be aware that attackers with authenticated access could exploit this flaw to gather intelligence or extract sensitive information, which may lead to compliance issues under GDPR if personal or sensitive data is exposed. The risk is heightened in environments where cloud metadata services are accessible and not properly secured.
Mitigation Recommendations
1. Immediate upgrade of the TablePress plugin to version 2.2.5 or later, where this vulnerability is patched. 2. Implement strict input validation and sanitization on URLs accepted by the plugin to prevent SSRF attempts. 3. Restrict access to cloud instance metadata services by applying network-level controls such as firewall rules or metadata service access restrictions (e.g., AWS IMDSv2 enforcement). 4. Limit the privileges of WordPress users to minimize the number of accounts that can supply URLs for import, reducing the attack surface. 5. Monitor and log outbound HTTP requests from the web server to detect unusual or unauthorized internal network access attempts. 6. Conduct regular security audits of WordPress plugins and cloud configurations to identify and remediate similar SSRF risks. 7. Employ Web Application Firewalls (WAFs) with SSRF detection capabilities to block malicious requests targeting internal resources.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy, Spain
CVE-2024-23825: CWE-918: Server-Side Request Forgery (SSRF) in TablePress TablePress
Description
TablePress is a table plugin for Wordpress. For importing tables, TablePress makes external HTTP requests based on a URL that is provided by the user. That user input is filtered insufficiently, which makes it is possible to send requests to unintended network locations and receive responses. On sites in a cloud environment like AWS, an attacker can potentially make GET requests to the instance's metadata REST API. If the instance's configuration is insecure, this can lead to the exposure of internal data, including credentials. This vulnerability is fixed in 2.2.5.
AI-Powered Analysis
Technical Analysis
CVE-2024-23825 is a Server-Side Request Forgery (SSRF) vulnerability identified in the TablePress plugin for WordPress, specifically in versions prior to 2.2.5. TablePress allows users to import tables by specifying a URL from which the plugin fetches data via HTTP requests. The vulnerability arises due to insufficient filtering and validation of the user-supplied URL input. This flaw enables an attacker to craft malicious URLs that cause the server hosting the WordPress site to send HTTP GET requests to unintended internal or external network locations. In cloud environments such as AWS, this can be particularly dangerous because an attacker might exploit the SSRF to query the instance metadata REST API, which often contains sensitive information like temporary credentials, configuration details, or tokens. If the cloud instance is misconfigured or overly permissive, this can lead to unauthorized disclosure of internal data. The vulnerability does not require user interaction but does require some level of privileges (as indicated by CVSS vector PR:H), which suggests that the attacker needs authenticated access to exploit it. The CVSS v3.1 base score is 3.0, indicating a low severity primarily due to the high attack complexity and required privileges. The vulnerability affects confidentiality but does not impact integrity or availability. No known exploits are currently reported in the wild, and the issue is resolved in TablePress version 2.2.5. The vulnerability is classified under CWE-918 (Server-Side Request Forgery).
Potential Impact
For European organizations using WordPress sites with the TablePress plugin versions earlier than 2.2.5, this vulnerability poses a risk of unauthorized internal network reconnaissance and potential data leakage. In cloud-hosted environments, especially those using AWS, the SSRF could allow attackers to access sensitive instance metadata, potentially exposing credentials that could be leveraged for further lateral movement or privilege escalation within the cloud infrastructure. This could lead to breaches of confidentiality and compromise of internal systems. Although the CVSS score is low, the impact can be significant if combined with other vulnerabilities or misconfigurations. Organizations relying on TablePress for public-facing or internal portals should be aware that attackers with authenticated access could exploit this flaw to gather intelligence or extract sensitive information, which may lead to compliance issues under GDPR if personal or sensitive data is exposed. The risk is heightened in environments where cloud metadata services are accessible and not properly secured.
Mitigation Recommendations
1. Immediate upgrade of the TablePress plugin to version 2.2.5 or later, where this vulnerability is patched. 2. Implement strict input validation and sanitization on URLs accepted by the plugin to prevent SSRF attempts. 3. Restrict access to cloud instance metadata services by applying network-level controls such as firewall rules or metadata service access restrictions (e.g., AWS IMDSv2 enforcement). 4. Limit the privileges of WordPress users to minimize the number of accounts that can supply URLs for import, reducing the attack surface. 5. Monitor and log outbound HTTP requests from the web server to detect unusual or unauthorized internal network access attempts. 6. Conduct regular security audits of WordPress plugins and cloud configurations to identify and remediate similar SSRF risks. 7. Employ Web Application Firewalls (WAFs) with SSRF detection capabilities to block malicious requests targeting internal resources.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2024-01-22T22:23:54.338Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683879c8182aa0cae28296c1
Added to database: 5/29/2025, 3:14:16 PM
Last enriched: 7/8/2025, 1:55:50 AM
Last updated: 9/24/2025, 1:00:01 PM
Views: 21
Related Threats
CVE-2025-1396: Vulnerability in WSO2 WSO2 Identity Server
LowCVE-2025-54831: CWE-213 Exposure of Sensitive Information Due to Incompatible Policies in Apache Software Foundation Apache Airflow
HighCVE-2025-35027: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Unitree Go2
HighCVE-2025-10490: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in dylanjkotze Zephyr Project Manager
MediumCVE-2025-10307: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in softaculous Backuply – Backup, Restore, Migrate and Clone
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.