TablePress <= 1.14 - Authenticated (Author+) CSV Injection

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE CVE-2019-20180
CVSS High (8)
Publicly Published February 1, 2020
Last Updated January 22, 2024
Researcher 0xPablito
Description

The TablePress plugin for WordPress is vulnerable to CSV Injection in versions up to and including 1.14 via the tablepress[data] value. This makes it possible for attackers with author level access and above to embed untrusted input into exported CSV files, which can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration. This vulnerability is not likely to be exploited in the wild due to its high complexity and many modern day protections, however, it could have a significant impact if exploited successfully at it's worst impact. Please note that while the CVE record says this issue was patched in 1.10, our team confirmed it was still exploitable in 1.14. The has been patched in version 2.0 of TablePress.

References

1 affected software package

Software Type Plugin
Software Slug tablepress (view on wordpress.org)
Patched? Yes
Affected Version
  • <= 1.14
Patched Version
  • 2.0
This record contains material that is subject to copyright

Copyright 2012-2026 Defiant Inc.
License: Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute this software vulnerability information. Any copy of the software vulnerability information you make for such purposes is authorized provided that you include a hyperlink to this vulnerability record and reproduce Defiant's copyright designation and this license in any such copy. License Detail.