Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14610: CWE-918 Server-Side Request Forgery (SSRF) in bloompixel TableMaster for Elementor – Advanced Responsive Tables for Elementor

0
High
VulnerabilityCVE-2025-14610cvecve-2025-14610cwe-918
Published: Wed Jan 28 2026 (01/28/2026, 05:30:19 UTC)
Source: CVE Database V5
Vendor/Project: bloompixel
Product: TableMaster for Elementor – Advanced Responsive Tables for Elementor

Description

The TableMaster for Elementor plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.3.6. This is due to the plugin not restricting which URLs can be fetched when importing CSV data from a URL in the Data Table widget. This makes it possible for authenticated attackers, with Author-level access and above, to make web requests to arbitrary locations, including localhost and internal network services, and read sensitive files such as wp-config.php via the 'csv_url' parameter.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 11:27:43 UTC

Technical Analysis

CVE-2025-14610 is a Server-Side Request Forgery (SSRF) vulnerability identified in the TableMaster for Elementor – Advanced Responsive Tables for Elementor WordPress plugin, affecting all versions up to and including 1.3.6. The vulnerability stems from insufficient validation of URLs provided via the 'csv_url' parameter used for importing CSV data into the Data Table widget. Authenticated attackers with Author-level privileges or higher can exploit this flaw to coerce the server into making HTTP requests to arbitrary destinations, including internal network addresses and localhost. This can be leveraged to access sensitive internal resources that are otherwise inaccessible externally, such as internal web services or configuration files like wp-config.php, which contains critical database credentials and security keys. The SSRF attack vector allows attackers to bypass network segmentation and firewall protections by abusing the server's trust relationship with internal resources. The vulnerability does not require user interaction beyond authentication, and the attack surface is limited to users with Author or higher roles, which are common in WordPress environments. The CVSS v3.1 base score is 7.2, reflecting a high-severity rating due to the potential confidentiality and integrity impacts. No patches or official fixes are currently linked, and no known exploits have been reported in the wild, but the risk remains significant given the sensitive nature of the data accessible via SSRF. The vulnerability is classified under CWE-918, which covers SSRF weaknesses.

Potential Impact

The impact of CVE-2025-14610 is substantial for organizations using the vulnerable TableMaster for Elementor plugin. Successful exploitation can lead to unauthorized internal network reconnaissance, allowing attackers to map internal services and potentially identify further vulnerabilities. Access to sensitive files such as wp-config.php can expose database credentials, enabling attackers to escalate privileges, access or modify the database, and compromise the entire WordPress installation. This can result in data breaches, website defacement, or complete site takeover. Since the vulnerability requires Author-level access, attackers who have compromised or gained such accounts (e.g., via phishing or credential reuse) can leverage this SSRF to deepen their foothold. The ability to read internal resources may also facilitate lateral movement within the network, increasing the risk of broader organizational compromise. The vulnerability does not directly affect availability but poses a high risk to confidentiality and integrity of data. Given the widespread use of WordPress and the popularity of Elementor plugins, many organizations globally could be affected, especially those not restricting user roles or lacking monitoring for unusual internal requests.

Mitigation Recommendations

To mitigate CVE-2025-14610, organizations should first update the TableMaster for Elementor plugin to a patched version once available. Until a patch is released, administrators should restrict plugin usage to trusted users only and review user roles to ensure that only necessary personnel have Author-level or higher privileges. Implement strict role-based access controls and monitor for unusual activity involving CSV imports or unexpected outbound requests from the web server. Network-level controls such as egress filtering can prevent the web server from making unauthorized requests to internal resources or localhost addresses. Web Application Firewalls (WAFs) can be configured to detect and block SSRF patterns, especially requests containing suspicious 'csv_url' parameters. Additionally, hardening WordPress installations by disabling unnecessary plugins and enforcing strong authentication mechanisms reduces the risk of initial account compromise. Regularly audit logs for anomalous access patterns and consider isolating WordPress servers in segmented network zones to limit the impact of SSRF exploitation. Finally, educate users with elevated privileges about phishing and credential hygiene to prevent account takeover.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-12T20:18:16.786Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6979a3c14623b1157c91fb7d

Added to database: 1/28/2026, 5:50:57 AM

Last enriched: 2/27/2026, 11:27:43 AM

Last updated: 3/25/2026, 1:24:22 AM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses