TablePress is a table plugin for Wordpress. For importing tables, TablePress makes external HTTP requests based on a URL that is provided by the user. That user input is filtered insufficiently, which makes it is possible to send requests to unintended network locations and receive responses. On sites in a cloud environment like AWS, an attacker can potentially make GET requests to the instance's metadata REST API. If the instance's configuration is insecure, this can lead to the exposure of internal data, including credentials. This vulnerability is fixed in 2.2.5.
References
Link | Resource |
---|---|
https://github.com/TablePress/TablePress/commit/62aab50e7a9c486caaeff26dff4dc01e059ecb91 | Patch |
https://github.com/TablePress/TablePress/security/advisories/GHSA-x8rf-c8x6-mrpg | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2024-01-30 17:15
Updated : 2024-02-05 18:46
NVD link : CVE-2024-23825
Mitre link : CVE-2024-23825
CVE.ORG link : CVE-2024-23825
JSON object : View
Products Affected
tablepress
- tablepress
CWE
CWE-918
Server-Side Request Forgery (SSRF)