CVE-2019-20180

TablePress <= 1.14 - Authenticated (Author+) CSV Injection

highImproper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
8.0
CVSS Score
8.0
CVSS Score
high
Severity
2.0
Patched in
1452d
Time to patch

Description

The TablePress plugin for WordPress is vulnerable to CSV Injection in versions up to and including 1.14 via the tablepress[data] value. This makes it possible for attackers with author level access and above to embed untrusted input into exported CSV files, which can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration. This vulnerability is not likely to be exploited in the wild due to its high complexity and many modern day protections, however, it could have a significant impact if exploited successfully at it's worst impact. Please note that while the CVE record says this issue was patched in 1.10, our team confirmed it was still exploitable in 1.14. The has been patched in version 2.0 of TablePress.

CVSS Vector Breakdown

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Changed
High
Confidentiality
High
Integrity
High
Availability

Technical Details

Affected versions<=1.14
PublishedFebruary 1, 2020
Last updatedJanuary 22, 2024
Affected plugintablepress

Check if your site is affected.

Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.