The TableMaster for Elementor plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.3.6. This is due to the plugin not restricting which URLs can be fetched when importing CSV data from a URL in the Data Table widget. This makes it possible for authenticated attackers, with Author-level access and above, to make web requests to arbitrary locations, including localhost and internal network services, and read sensitive files such as wp-config.php via the 'csv_url' parameter.

Project Subscriptions

Vendors Products
Bloompixel Subscribe
Tablemaster For Elementor Subscribe
Elementor Subscribe
Elementor Subscribe
Wordpress Subscribe
Wordpress Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 28 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 28 Jan 2026 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Bloompixel
Bloompixel tablemaster For Elementor
Elementor
Elementor elementor
Wordpress
Wordpress wordpress
Vendors & Products Bloompixel
Bloompixel tablemaster For Elementor
Elementor
Elementor elementor
Wordpress
Wordpress wordpress

Wed, 28 Jan 2026 05:45:00 +0000

Type Values Removed Values Added
Description The TableMaster for Elementor plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.3.6. This is due to the plugin not restricting which URLs can be fetched when importing CSV data from a URL in the Data Table widget. This makes it possible for authenticated attackers, with Author-level access and above, to make web requests to arbitrary locations, including localhost and internal network services, and read sensitive files such as wp-config.php via the 'csv_url' parameter.
Title TableMaster for Elementor <= 1.3.6 - Authenticated (Author+) Server-Side Request Forgery via 'csv_url' Parameter
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-01-28T20:50:21.870Z

Reserved: 2025-12-12T20:18:16.786Z

Link: CVE-2025-14610

cve-icon Vulnrichment

Updated: 2026-01-28T20:50:18.827Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-28T06:15:48.457

Modified: 2026-01-29T16:31:35.700

Link: CVE-2025-14610

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-28T12:21:35Z

Weaknesses