Impact
The Ninja Tables – Easy Data Table Builder plugin contains a Server‑Side Request Forgery flaw that allows an unauthenticated attacker to supply an arbitrary URL through the args[url] parameter. This weakness, classified as CWE‑918, enables a malicious actor to instruct the WordPress installation to perform HTTP requests on its behalf, potentially accessing internal network services or extracting sensitive data. The impact is a compromised confidentiality and integrity of internal resources and services that are reachable from the web server.
Affected Systems
WordPress sites that have installed Ninja Tables version 5.0.18 or earlier are affected. The vulnerability resides in the core framework used to send HTTP requests, so any installation of the plugin on those versions is vulnerable regardless of theme or other plugins.
Risk and Exploitability
The CVSS score of 7.2 reflects a high severity, while an EPSS score of less than 1% indicates a low likelihood of widespread exploitation at the moment. The vulnerability is not listed in the CISA KEV catalog. An attacker would need to craft a request that targets the plugin’s args[url] parameter, which can be done from any unauthenticated source that can reach the site’s front‑end. Once triggered, the attacker can access internal network resources and perform read or write operations against those services.
OpenCVE Enrichment
EUVD