CVE-2025-14610: CWE-918 Server-Side Request Forgery (SSRF) in bloompixel TableMaster for Elementor – Advanced Responsive Tables for Elementor
The TableMaster for Elementor plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.3.6. This is due to the plugin not restricting which URLs can be fetched when importing CSV data from a URL in the Data Table widget. This makes it possible for authenticated attackers, with Author-level access and above, to make web requests to arbitrary locations, including localhost and internal network services, and read sensitive files such as wp-config.php via the 'csv_url' parameter.
AI Analysis
Technical Summary
CVE-2025-14610 is a Server-Side Request Forgery (SSRF) vulnerability identified in the TableMaster for Elementor – Advanced Responsive Tables for Elementor WordPress plugin, affecting all versions up to and including 1.3.6. The vulnerability stems from insufficient validation of URLs provided via the 'csv_url' parameter used for importing CSV data into the Data Table widget. Authenticated attackers with Author-level privileges or higher can exploit this flaw to coerce the server into making HTTP requests to arbitrary destinations, including internal network addresses and localhost. This can be leveraged to access sensitive internal resources that are otherwise inaccessible externally, such as internal web services or configuration files like wp-config.php, which contains critical database credentials and security keys. The SSRF attack vector allows attackers to bypass network segmentation and firewall protections by abusing the server's trust relationship with internal resources. The vulnerability does not require user interaction beyond authentication, and the attack surface is limited to users with Author or higher roles, which are common in WordPress environments. The CVSS v3.1 base score is 7.2, reflecting a high-severity rating due to the potential confidentiality and integrity impacts. No patches or official fixes are currently linked, and no known exploits have been reported in the wild, but the risk remains significant given the sensitive nature of the data accessible via SSRF. The vulnerability is classified under CWE-918, which covers SSRF weaknesses.
Potential Impact
The impact of CVE-2025-14610 is substantial for organizations using the vulnerable TableMaster for Elementor plugin. Successful exploitation can lead to unauthorized internal network reconnaissance, allowing attackers to map internal services and potentially identify further vulnerabilities. Access to sensitive files such as wp-config.php can expose database credentials, enabling attackers to escalate privileges, access or modify the database, and compromise the entire WordPress installation. This can result in data breaches, website defacement, or complete site takeover. Since the vulnerability requires Author-level access, attackers who have compromised or gained such accounts (e.g., via phishing or credential reuse) can leverage this SSRF to deepen their foothold. The ability to read internal resources may also facilitate lateral movement within the network, increasing the risk of broader organizational compromise. The vulnerability does not directly affect availability but poses a high risk to confidentiality and integrity of data. Given the widespread use of WordPress and the popularity of Elementor plugins, many organizations globally could be affected, especially those not restricting user roles or lacking monitoring for unusual internal requests.
Mitigation Recommendations
To mitigate CVE-2025-14610, organizations should first update the TableMaster for Elementor plugin to a patched version once available. Until a patch is released, administrators should restrict plugin usage to trusted users only and review user roles to ensure that only necessary personnel have Author-level or higher privileges. Implement strict role-based access controls and monitor for unusual activity involving CSV imports or unexpected outbound requests from the web server. Network-level controls such as egress filtering can prevent the web server from making unauthorized requests to internal resources or localhost addresses. Web Application Firewalls (WAFs) can be configured to detect and block SSRF patterns, especially requests containing suspicious 'csv_url' parameters. Additionally, hardening WordPress installations by disabling unnecessary plugins and enforcing strong authentication mechanisms reduces the risk of initial account compromise. Regularly audit logs for anomalous access patterns and consider isolating WordPress servers in segmented network zones to limit the impact of SSRF exploitation. Finally, educate users with elevated privileges about phishing and credential hygiene to prevent account takeover.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan, South Korea, Italy
CVE-2025-14610: CWE-918 Server-Side Request Forgery (SSRF) in bloompixel TableMaster for Elementor – Advanced Responsive Tables for Elementor
Description
The TableMaster for Elementor plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.3.6. This is due to the plugin not restricting which URLs can be fetched when importing CSV data from a URL in the Data Table widget. This makes it possible for authenticated attackers, with Author-level access and above, to make web requests to arbitrary locations, including localhost and internal network services, and read sensitive files such as wp-config.php via the 'csv_url' parameter.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-14610 is a Server-Side Request Forgery (SSRF) vulnerability identified in the TableMaster for Elementor – Advanced Responsive Tables for Elementor WordPress plugin, affecting all versions up to and including 1.3.6. The vulnerability stems from insufficient validation of URLs provided via the 'csv_url' parameter used for importing CSV data into the Data Table widget. Authenticated attackers with Author-level privileges or higher can exploit this flaw to coerce the server into making HTTP requests to arbitrary destinations, including internal network addresses and localhost. This can be leveraged to access sensitive internal resources that are otherwise inaccessible externally, such as internal web services or configuration files like wp-config.php, which contains critical database credentials and security keys. The SSRF attack vector allows attackers to bypass network segmentation and firewall protections by abusing the server's trust relationship with internal resources. The vulnerability does not require user interaction beyond authentication, and the attack surface is limited to users with Author or higher roles, which are common in WordPress environments. The CVSS v3.1 base score is 7.2, reflecting a high-severity rating due to the potential confidentiality and integrity impacts. No patches or official fixes are currently linked, and no known exploits have been reported in the wild, but the risk remains significant given the sensitive nature of the data accessible via SSRF. The vulnerability is classified under CWE-918, which covers SSRF weaknesses.
Potential Impact
The impact of CVE-2025-14610 is substantial for organizations using the vulnerable TableMaster for Elementor plugin. Successful exploitation can lead to unauthorized internal network reconnaissance, allowing attackers to map internal services and potentially identify further vulnerabilities. Access to sensitive files such as wp-config.php can expose database credentials, enabling attackers to escalate privileges, access or modify the database, and compromise the entire WordPress installation. This can result in data breaches, website defacement, or complete site takeover. Since the vulnerability requires Author-level access, attackers who have compromised or gained such accounts (e.g., via phishing or credential reuse) can leverage this SSRF to deepen their foothold. The ability to read internal resources may also facilitate lateral movement within the network, increasing the risk of broader organizational compromise. The vulnerability does not directly affect availability but poses a high risk to confidentiality and integrity of data. Given the widespread use of WordPress and the popularity of Elementor plugins, many organizations globally could be affected, especially those not restricting user roles or lacking monitoring for unusual internal requests.
Mitigation Recommendations
To mitigate CVE-2025-14610, organizations should first update the TableMaster for Elementor plugin to a patched version once available. Until a patch is released, administrators should restrict plugin usage to trusted users only and review user roles to ensure that only necessary personnel have Author-level or higher privileges. Implement strict role-based access controls and monitor for unusual activity involving CSV imports or unexpected outbound requests from the web server. Network-level controls such as egress filtering can prevent the web server from making unauthorized requests to internal resources or localhost addresses. Web Application Firewalls (WAFs) can be configured to detect and block SSRF patterns, especially requests containing suspicious 'csv_url' parameters. Additionally, hardening WordPress installations by disabling unnecessary plugins and enforcing strong authentication mechanisms reduces the risk of initial account compromise. Regularly audit logs for anomalous access patterns and consider isolating WordPress servers in segmented network zones to limit the impact of SSRF exploitation. Finally, educate users with elevated privileges about phishing and credential hygiene to prevent account takeover.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-12T20:18:16.786Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6979a3c14623b1157c91fb7d
Added to database: 1/28/2026, 5:50:57 AM
Last enriched: 2/27/2026, 11:27:43 AM
Last updated: 3/24/2026, 12:58:58 PM
Views: 80
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.