CVE-2024-23825: CWE-918: Server-Side Request Forgery (SSRF) in TablePress TablePress
TablePress is a table plugin for Wordpress. For importing tables, TablePress makes external HTTP requests based on a URL that is provided by the user. That user input is filtered insufficiently, which makes it is possible to send requests to unintended network locations and receive responses. On sites in a cloud environment like AWS, an attacker can potentially make GET requests to the instance's metadata REST API. If the instance's configuration is insecure, this can lead to the exposure of internal data, including credentials. This vulnerability is fixed in 2.2.5.
AI Analysis
Technical Summary
CVE-2024-23825 is a Server-Side Request Forgery (SSRF) vulnerability identified in the TablePress plugin for WordPress, specifically in versions prior to 2.2.5. TablePress allows users to import tables by specifying a URL from which the plugin fetches data via HTTP requests. The vulnerability arises due to insufficient filtering and validation of the user-supplied URL input. This flaw enables an attacker to craft malicious URLs that cause the server hosting the WordPress site to send HTTP GET requests to unintended internal or external network locations. In cloud environments such as AWS, this can be particularly dangerous because an attacker might exploit the SSRF to query the instance metadata REST API, which often contains sensitive information like temporary credentials, configuration details, or tokens. If the cloud instance is misconfigured or overly permissive, this can lead to unauthorized disclosure of internal data. The vulnerability does not require user interaction but does require some level of privileges (as indicated by CVSS vector PR:H), which suggests that the attacker needs authenticated access to exploit it. The CVSS v3.1 base score is 3.0, indicating a low severity primarily due to the high attack complexity and required privileges. The vulnerability affects confidentiality but does not impact integrity or availability. No known exploits are currently reported in the wild, and the issue is resolved in TablePress version 2.2.5. The vulnerability is classified under CWE-918 (Server-Side Request Forgery).
Potential Impact
For European organizations using WordPress sites with the TablePress plugin versions earlier than 2.2.5, this vulnerability poses a risk of unauthorized internal network reconnaissance and potential data leakage. In cloud-hosted environments, especially those using AWS, the SSRF could allow attackers to access sensitive instance metadata, potentially exposing credentials that could be leveraged for further lateral movement or privilege escalation within the cloud infrastructure. This could lead to breaches of confidentiality and compromise of internal systems. Although the CVSS score is low, the impact can be significant if combined with other vulnerabilities or misconfigurations. Organizations relying on TablePress for public-facing or internal portals should be aware that attackers with authenticated access could exploit this flaw to gather intelligence or extract sensitive information, which may lead to compliance issues under GDPR if personal or sensitive data is exposed. The risk is heightened in environments where cloud metadata services are accessible and not properly secured.
Mitigation Recommendations
1. Immediate upgrade of the TablePress plugin to version 2.2.5 or later, where this vulnerability is patched. 2. Implement strict input validation and sanitization on URLs accepted by the plugin to prevent SSRF attempts. 3. Restrict access to cloud instance metadata services by applying network-level controls such as firewall rules or metadata service access restrictions (e.g., AWS IMDSv2 enforcement). 4. Limit the privileges of WordPress users to minimize the number of accounts that can supply URLs for import, reducing the attack surface. 5. Monitor and log outbound HTTP requests from the web server to detect unusual or unauthorized internal network access attempts. 6. Conduct regular security audits of WordPress plugins and cloud configurations to identify and remediate similar SSRF risks. 7. Employ Web Application Firewalls (WAFs) with SSRF detection capabilities to block malicious requests targeting internal resources.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy, Spain
CVE-2024-23825: CWE-918: Server-Side Request Forgery (SSRF) in TablePress TablePress
Description
TablePress is a table plugin for Wordpress. For importing tables, TablePress makes external HTTP requests based on a URL that is provided by the user. That user input is filtered insufficiently, which makes it is possible to send requests to unintended network locations and receive responses. On sites in a cloud environment like AWS, an attacker can potentially make GET requests to the instance's metadata REST API. If the instance's configuration is insecure, this can lead to the exposure of internal data, including credentials. This vulnerability is fixed in 2.2.5.
AI-Powered Analysis
Technical Analysis
CVE-2024-23825 is a Server-Side Request Forgery (SSRF) vulnerability identified in the TablePress plugin for WordPress, specifically in versions prior to 2.2.5. TablePress allows users to import tables by specifying a URL from which the plugin fetches data via HTTP requests. The vulnerability arises due to insufficient filtering and validation of the user-supplied URL input. This flaw enables an attacker to craft malicious URLs that cause the server hosting the WordPress site to send HTTP GET requests to unintended internal or external network locations. In cloud environments such as AWS, this can be particularly dangerous because an attacker might exploit the SSRF to query the instance metadata REST API, which often contains sensitive information like temporary credentials, configuration details, or tokens. If the cloud instance is misconfigured or overly permissive, this can lead to unauthorized disclosure of internal data. The vulnerability does not require user interaction but does require some level of privileges (as indicated by CVSS vector PR:H), which suggests that the attacker needs authenticated access to exploit it. The CVSS v3.1 base score is 3.0, indicating a low severity primarily due to the high attack complexity and required privileges. The vulnerability affects confidentiality but does not impact integrity or availability. No known exploits are currently reported in the wild, and the issue is resolved in TablePress version 2.2.5. The vulnerability is classified under CWE-918 (Server-Side Request Forgery).
Potential Impact
For European organizations using WordPress sites with the TablePress plugin versions earlier than 2.2.5, this vulnerability poses a risk of unauthorized internal network reconnaissance and potential data leakage. In cloud-hosted environments, especially those using AWS, the SSRF could allow attackers to access sensitive instance metadata, potentially exposing credentials that could be leveraged for further lateral movement or privilege escalation within the cloud infrastructure. This could lead to breaches of confidentiality and compromise of internal systems. Although the CVSS score is low, the impact can be significant if combined with other vulnerabilities or misconfigurations. Organizations relying on TablePress for public-facing or internal portals should be aware that attackers with authenticated access could exploit this flaw to gather intelligence or extract sensitive information, which may lead to compliance issues under GDPR if personal or sensitive data is exposed. The risk is heightened in environments where cloud metadata services are accessible and not properly secured.
Mitigation Recommendations
1. Immediate upgrade of the TablePress plugin to version 2.2.5 or later, where this vulnerability is patched. 2. Implement strict input validation and sanitization on URLs accepted by the plugin to prevent SSRF attempts. 3. Restrict access to cloud instance metadata services by applying network-level controls such as firewall rules or metadata service access restrictions (e.g., AWS IMDSv2 enforcement). 4. Limit the privileges of WordPress users to minimize the number of accounts that can supply URLs for import, reducing the attack surface. 5. Monitor and log outbound HTTP requests from the web server to detect unusual or unauthorized internal network access attempts. 6. Conduct regular security audits of WordPress plugins and cloud configurations to identify and remediate similar SSRF risks. 7. Employ Web Application Firewalls (WAFs) with SSRF detection capabilities to block malicious requests targeting internal resources.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2024-01-22T22:23:54.338Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683879c8182aa0cae28296c1
Added to database: 5/29/2025, 3:14:16 PM
Last enriched: 7/8/2025, 1:55:50 AM
Last updated: 8/2/2025, 4:36:29 AM
Views: 12
Related Threats
CVE-2025-8604: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wptb WP Table Builder – WordPress Table Plugin
MediumCVE-2025-9016: Uncontrolled Search Path in Mechrevo Control Center GX V2
HighCVE-2025-8451: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdevteam Essential Addons for Elementor – Popular Elementor Templates & Widgets
MediumCVE-2025-8013: CWE-918 Server-Side Request Forgery (SSRF) in quttera Quttera Web Malware Scanner
LowCVE-2025-6679: CWE-434 Unrestricted Upload of File with Dangerous Type in bitpressadmin Bit Form – Custom Contact Form, Multi Step, Conversational, Payment & Quiz Form builder
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.