TablePress is a table plugin for Wordpress. For importing tables, TablePress makes external HTTP requests based on a URL that is provided by the user. That user input is filtered insufficiently, which makes it is possible to send requests to unintended network locations and receive responses. On sites in a cloud environment like AWS, an attacker can potentially make GET requests to the instance's metadata REST API. If the instance's configuration is insecure, this can lead to the exposure of internal data, including credentials. This vulnerability is fixed in 2.2.5.
References
Link | Resource |
---|---|
https://github.com/TablePress/TablePress/commit/62aab50e7a9c486caaeff26dff4dc01e059ecb91 | Patch |
https://github.com/TablePress/TablePress/security/advisories/GHSA-x8rf-c8x6-mrpg | Exploit Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-01-30T16:22:04.876Z
Updated: 2024-01-30T16:22:04.876Z
Reserved: 2024-01-22T22:23:54.338Z
Link: CVE-2024-23825
JSON object: View
NVD Information
Status : Analyzed
Published: 2024-01-30T17:15:11.180
Modified: 2024-02-05T18:46:02.203
Link: CVE-2024-23825
JSON object: View
Redhat Information
No data.
CWE