CVE-2025-2940
BaseFortify
Publication date: 2025-06-27
Last updated on: 2025-07-07
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wpmanageninja | ninja_tables | to 5.0.19 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-918 | The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in the Ninja Tables β Easy Data Table Builder plugin for WordPress is a Server-Side Request Forgery (SSRF) issue affecting all versions up to and including 5.0.18. It occurs via the args[url] parameter, allowing unauthenticated attackers to make web requests from the web application to arbitrary locations. This means attackers can potentially query and modify information from internal services by exploiting this flaw.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing unauthenticated attackers to make arbitrary web requests originating from your web application. This can lead to unauthorized querying and modification of information from internal services that are normally protected, potentially exposing sensitive data or enabling further attacks within your internal network.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should update the Ninja Tables β Easy Data Table Builder WordPress plugin to version 5.0.19 or later, as this version includes a large-scale update likely addressing security issues including CVE-2025-2940. [1]