Impact
The Create DB Tables plugin registers two admin_post action hooks for creating and deleting database tables, but it does not perform capability checks or nonce verification. An attacker who is logged in, even as a Subscriber, can send a POST request to these endpoints and cause the plugin to execute DROP or CREATE TABLE statements against the WordPress database. This allows the attacker to delete core tables such as wp_users or wp_options, or create malicious tables, effectively destroying the site or enabling further compromise.
Affected Systems
All WordPress sites running the Create DB Tables plugin version 1.2.1 or earlier are affected. The plugin is provided by jppreus and can be installed through the WordPress plugin repository.
Risk and Exploitability
The vulnerability has a CVSS score of 9.1, indicating critical severity, and no EPSS score is available; it is not listed in the CISA KEV catalog. Because the attack vector requires only authentication, any user with a logged‑in account, including Subscribers, can perform the exploit. An attacker can therefore readily delete or create tables, compromising data integrity and availability across the entire WordPress installation.
OpenCVE Enrichment