Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14610: CWE-918 Server-Side Request Forgery (SSRF) in bloompixel TableMaster for Elementor – Advanced Responsive Tables for Elementor

0
High
VulnerabilityCVE-2025-14610cvecve-2025-14610cwe-918
Published: Wed Jan 28 2026 (01/28/2026, 05:30:19 UTC)
Source: CVE Database V5
Vendor/Project: bloompixel
Product: TableMaster for Elementor – Advanced Responsive Tables for Elementor

Description

CVE-2025-14610 is a high-severity Server-Side Request Forgery (SSRF) vulnerability in the TableMaster for Elementor WordPress plugin, affecting all versions up to 1. 3. 6. Authenticated users with Author-level access or higher can exploit this flaw by manipulating the 'csv_url' parameter to make arbitrary HTTP requests from the server, including to localhost or internal network services. This can lead to unauthorized reading of sensitive files such as wp-config. php, potentially exposing database credentials and other secrets. The vulnerability arises because the plugin does not restrict or validate URLs when importing CSV data. Although no public exploits are currently known, the vulnerability's impact on confidentiality and integrity is significant, especially for WordPress sites using this plugin. European organizations using this plugin should prioritize patching or mitigating this issue to prevent internal network reconnaissance and data leakage. Countries with high WordPress adoption and significant e-commerce or media presence, such as Germany, the UK, France, and the Netherlands, are most likely to be affected.

AI-Powered Analysis

AILast updated: 02/04/2026, 09:16:47 UTC

Technical Analysis

CVE-2025-14610 is a Server-Side Request Forgery (SSRF) vulnerability identified in the TableMaster for Elementor plugin for WordPress, specifically in versions up to and including 1.3.6. The vulnerability stems from the plugin's failure to restrict or validate URLs provided via the 'csv_url' parameter when importing CSV data into the Data Table widget. An authenticated attacker with Author-level privileges or higher can exploit this flaw by submitting a crafted URL, causing the server to perform HTTP requests to arbitrary destinations. This includes internal network resources such as localhost or intranet services that are typically inaccessible externally. The SSRF can be leveraged to read sensitive files like wp-config.php, which contains database credentials and other critical configuration data, thereby compromising confidentiality and potentially enabling further attacks. The vulnerability does not require user interaction beyond authentication, and the attack surface is limited to users with Author or higher roles, which are common in collaborative WordPress environments. Although no public exploits have been reported yet, the CVSS 3.1 score of 7.2 (high) reflects the ease of exploitation combined with significant confidentiality and integrity impacts. The scope is limited to sites using this specific plugin, but given WordPress's widespread use, the potential reach is substantial. No patches or updates are currently linked, so mitigation relies on access control, monitoring, and network-level defenses until an official fix is released.

Potential Impact

For European organizations, this vulnerability poses a significant risk to WordPress-based websites that utilize the TableMaster for Elementor plugin. Exploitation can lead to unauthorized internal network reconnaissance, exposure of sensitive configuration files, and potential compromise of database credentials. This can cascade into data breaches, website defacement, or further lateral movement within the network. Organizations in sectors such as e-commerce, media, education, and government—where WordPress is prevalent—may face disruption of services and loss of customer trust. The ability to access internal services via SSRF could also expose internal APIs or management interfaces, increasing the attack surface. Given the high adoption of WordPress in Europe and the collaborative nature of content management systems, the risk of insider threats or compromised user accounts exploiting this vulnerability is non-negligible. Additionally, GDPR implications arise if personal data is exposed, leading to potential regulatory penalties.

Mitigation Recommendations

1. Restrict plugin usage to trusted users only, limiting Author-level and higher privileges to essential personnel. 2. Implement strict input validation and URL whitelisting at the application or proxy level to prevent SSRF attempts targeting internal or sensitive endpoints. 3. Deploy Web Application Firewalls (WAFs) with rules designed to detect and block SSRF patterns, especially requests containing internal IP ranges or localhost references. 4. Monitor server logs and network traffic for unusual outbound HTTP requests originating from the WordPress server, particularly those triggered by the plugin. 5. Disable the CSV import feature or the entire TableMaster plugin until an official patch is released. 6. Keep WordPress core, plugins, and themes updated to minimize exposure to known vulnerabilities. 7. Conduct regular security audits and penetration tests focusing on internal network access via web applications. 8. Consider network segmentation to limit the WordPress server's ability to reach sensitive internal services. 9. Educate content editors and administrators about the risks of SSRF and the importance of credential hygiene to prevent account compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-12T20:18:16.786Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6979a3c14623b1157c91fb7d

Added to database: 1/28/2026, 5:50:57 AM

Last enriched: 2/4/2026, 9:16:47 AM

Last updated: 2/7/2026, 10:37:20 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats