CVE-2025-14610: CWE-918 Server-Side Request Forgery (SSRF) in bloompixel TableMaster for Elementor – Advanced Responsive Tables for Elementor
CVE-2025-14610 is a high-severity Server-Side Request Forgery (SSRF) vulnerability in the TableMaster for Elementor WordPress plugin, affecting all versions up to 1. 3. 6. Authenticated users with Author-level access or higher can exploit this flaw by manipulating the 'csv_url' parameter to make arbitrary HTTP requests from the server, including to localhost or internal network services. This can lead to unauthorized reading of sensitive files such as wp-config. php, potentially exposing database credentials and other secrets. The vulnerability arises because the plugin does not restrict or validate URLs when importing CSV data. Although no public exploits are currently known, the vulnerability's impact on confidentiality and integrity is significant, especially for WordPress sites using this plugin. European organizations using this plugin should prioritize patching or mitigating this issue to prevent internal network reconnaissance and data leakage. Countries with high WordPress adoption and significant e-commerce or media presence, such as Germany, the UK, France, and the Netherlands, are most likely to be affected.
AI Analysis
Technical Summary
CVE-2025-14610 is a Server-Side Request Forgery (SSRF) vulnerability identified in the TableMaster for Elementor plugin for WordPress, specifically in versions up to and including 1.3.6. The vulnerability stems from the plugin's failure to restrict or validate URLs provided via the 'csv_url' parameter when importing CSV data into the Data Table widget. An authenticated attacker with Author-level privileges or higher can exploit this flaw by submitting a crafted URL, causing the server to perform HTTP requests to arbitrary destinations. This includes internal network resources such as localhost or intranet services that are typically inaccessible externally. The SSRF can be leveraged to read sensitive files like wp-config.php, which contains database credentials and other critical configuration data, thereby compromising confidentiality and potentially enabling further attacks. The vulnerability does not require user interaction beyond authentication, and the attack surface is limited to users with Author or higher roles, which are common in collaborative WordPress environments. Although no public exploits have been reported yet, the CVSS 3.1 score of 7.2 (high) reflects the ease of exploitation combined with significant confidentiality and integrity impacts. The scope is limited to sites using this specific plugin, but given WordPress's widespread use, the potential reach is substantial. No patches or updates are currently linked, so mitigation relies on access control, monitoring, and network-level defenses until an official fix is released.
Potential Impact
For European organizations, this vulnerability poses a significant risk to WordPress-based websites that utilize the TableMaster for Elementor plugin. Exploitation can lead to unauthorized internal network reconnaissance, exposure of sensitive configuration files, and potential compromise of database credentials. This can cascade into data breaches, website defacement, or further lateral movement within the network. Organizations in sectors such as e-commerce, media, education, and government—where WordPress is prevalent—may face disruption of services and loss of customer trust. The ability to access internal services via SSRF could also expose internal APIs or management interfaces, increasing the attack surface. Given the high adoption of WordPress in Europe and the collaborative nature of content management systems, the risk of insider threats or compromised user accounts exploiting this vulnerability is non-negligible. Additionally, GDPR implications arise if personal data is exposed, leading to potential regulatory penalties.
Mitigation Recommendations
1. Restrict plugin usage to trusted users only, limiting Author-level and higher privileges to essential personnel. 2. Implement strict input validation and URL whitelisting at the application or proxy level to prevent SSRF attempts targeting internal or sensitive endpoints. 3. Deploy Web Application Firewalls (WAFs) with rules designed to detect and block SSRF patterns, especially requests containing internal IP ranges or localhost references. 4. Monitor server logs and network traffic for unusual outbound HTTP requests originating from the WordPress server, particularly those triggered by the plugin. 5. Disable the CSV import feature or the entire TableMaster plugin until an official patch is released. 6. Keep WordPress core, plugins, and themes updated to minimize exposure to known vulnerabilities. 7. Conduct regular security audits and penetration tests focusing on internal network access via web applications. 8. Consider network segmentation to limit the WordPress server's ability to reach sensitive internal services. 9. Educate content editors and administrators about the risks of SSRF and the importance of credential hygiene to prevent account compromise.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-14610: CWE-918 Server-Side Request Forgery (SSRF) in bloompixel TableMaster for Elementor – Advanced Responsive Tables for Elementor
Description
CVE-2025-14610 is a high-severity Server-Side Request Forgery (SSRF) vulnerability in the TableMaster for Elementor WordPress plugin, affecting all versions up to 1. 3. 6. Authenticated users with Author-level access or higher can exploit this flaw by manipulating the 'csv_url' parameter to make arbitrary HTTP requests from the server, including to localhost or internal network services. This can lead to unauthorized reading of sensitive files such as wp-config. php, potentially exposing database credentials and other secrets. The vulnerability arises because the plugin does not restrict or validate URLs when importing CSV data. Although no public exploits are currently known, the vulnerability's impact on confidentiality and integrity is significant, especially for WordPress sites using this plugin. European organizations using this plugin should prioritize patching or mitigating this issue to prevent internal network reconnaissance and data leakage. Countries with high WordPress adoption and significant e-commerce or media presence, such as Germany, the UK, France, and the Netherlands, are most likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-14610 is a Server-Side Request Forgery (SSRF) vulnerability identified in the TableMaster for Elementor plugin for WordPress, specifically in versions up to and including 1.3.6. The vulnerability stems from the plugin's failure to restrict or validate URLs provided via the 'csv_url' parameter when importing CSV data into the Data Table widget. An authenticated attacker with Author-level privileges or higher can exploit this flaw by submitting a crafted URL, causing the server to perform HTTP requests to arbitrary destinations. This includes internal network resources such as localhost or intranet services that are typically inaccessible externally. The SSRF can be leveraged to read sensitive files like wp-config.php, which contains database credentials and other critical configuration data, thereby compromising confidentiality and potentially enabling further attacks. The vulnerability does not require user interaction beyond authentication, and the attack surface is limited to users with Author or higher roles, which are common in collaborative WordPress environments. Although no public exploits have been reported yet, the CVSS 3.1 score of 7.2 (high) reflects the ease of exploitation combined with significant confidentiality and integrity impacts. The scope is limited to sites using this specific plugin, but given WordPress's widespread use, the potential reach is substantial. No patches or updates are currently linked, so mitigation relies on access control, monitoring, and network-level defenses until an official fix is released.
Potential Impact
For European organizations, this vulnerability poses a significant risk to WordPress-based websites that utilize the TableMaster for Elementor plugin. Exploitation can lead to unauthorized internal network reconnaissance, exposure of sensitive configuration files, and potential compromise of database credentials. This can cascade into data breaches, website defacement, or further lateral movement within the network. Organizations in sectors such as e-commerce, media, education, and government—where WordPress is prevalent—may face disruption of services and loss of customer trust. The ability to access internal services via SSRF could also expose internal APIs or management interfaces, increasing the attack surface. Given the high adoption of WordPress in Europe and the collaborative nature of content management systems, the risk of insider threats or compromised user accounts exploiting this vulnerability is non-negligible. Additionally, GDPR implications arise if personal data is exposed, leading to potential regulatory penalties.
Mitigation Recommendations
1. Restrict plugin usage to trusted users only, limiting Author-level and higher privileges to essential personnel. 2. Implement strict input validation and URL whitelisting at the application or proxy level to prevent SSRF attempts targeting internal or sensitive endpoints. 3. Deploy Web Application Firewalls (WAFs) with rules designed to detect and block SSRF patterns, especially requests containing internal IP ranges or localhost references. 4. Monitor server logs and network traffic for unusual outbound HTTP requests originating from the WordPress server, particularly those triggered by the plugin. 5. Disable the CSV import feature or the entire TableMaster plugin until an official patch is released. 6. Keep WordPress core, plugins, and themes updated to minimize exposure to known vulnerabilities. 7. Conduct regular security audits and penetration tests focusing on internal network access via web applications. 8. Consider network segmentation to limit the WordPress server's ability to reach sensitive internal services. 9. Educate content editors and administrators about the risks of SSRF and the importance of credential hygiene to prevent account compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-12T20:18:16.786Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6979a3c14623b1157c91fb7d
Added to database: 1/28/2026, 5:50:57 AM
Last enriched: 2/4/2026, 9:16:47 AM
Last updated: 2/6/2026, 12:34:54 PM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2018: SQL Injection in itsourcecode School Management System
MediumCVE-2026-2017: Stack-based Buffer Overflow in IP-COM W30AP
CriticalCVE-2026-1293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in yoast Yoast SEO – Advanced SEO with real-time guidance and built-in AI
MediumCVE-2026-2016: Stack-based Buffer Overflow in happyfish100 libfastcommon
MediumCVE-2026-2015: Improper Authorization in Portabilis i-Educar
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.