CVE-2025-11499

The · The Tablesome Table – Contact Form DB – WPForms, CF7, Gravity, Forminator, Fluent plugin for WordPress

A critical vulnerability has been identified in The Tablesome Table WordPress plugin, which allows an unauthenticated attacker to upload arbitrary files to the server.

Executive summary

A critical vulnerability has been identified in The Tablesome Table WordPress plugin, which allows an unauthenticated attacker to upload arbitrary files to the server. This flaw, due to missing file type validation, can be exploited to execute malicious code, leading to a complete compromise of the affected website, data theft, and further network intrusion.

Vulnerability

The plugin is vulnerable to arbitrary file uploads due to a lack of proper file type validation in a function related to setting a featured image (likely set_featured_image). An attacker can upload a malicious script (e.g., a PHP web shell) disguised as a standard file type. Once uploaded, the attacker can navigate to the file's location on the server and execute it, gaining remote code execution capabilities within the security context of the web server.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation could lead to a complete system compromise, resulting in significant business impact. Potential consequences include theft of sensitive data stored on the website (customer information, payment details, intellectual property), website defacement, deployment of ransomware, or using the compromised server as a pivot point to launch further attacks against the internal network. Such an incident can cause severe reputational damage, financial loss, and potential regulatory fines.

Remediation

Immediate Action: Immediately update The Tablesome Table plugin to the latest patched version as recommended by the vendor. After patching, it is crucial to monitor for any signs of post-exploitation activity by reviewing web server access logs and file systems for indicators of compromise.

Proactive Monitoring: Organizations should actively monitor for exploitation attempts. Look for suspicious POST requests to the plugin's endpoints in web server logs, unexpected file uploads (especially files with extensions like .php, .phtml, .php5) in media or upload directories, and any unusual outbound network traffic originating from the web server.

Compensating Controls: If immediate patching is not feasible, consider implementing a Web Application Firewall (WAF) with rules to block malicious file uploads. Temporarily disabling the affected plugin can also serve as an immediate mitigation step, though this will impact functionality. Additionally, enforcing strict file permissions on the web server's upload directories can limit an attacker's ability to execute an uploaded file.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the critical CVSS score of 9.8, this vulnerability represents a significant and immediate threat to any organization using the affected plugin. We strongly recommend prioritizing the patching of this vulnerability across all affected assets without delay. Although this CVE is not currently listed on the CISA KEV catalog, its severity makes it a prime target for opportunistic and targeted attacks. Organizations should assume imminent exploitation and act decisively to apply the vendor-supplied updates.