WordPress plugin "TablePress" vulnerable to improper restriction of XML external entity (XXE) references


The WordPress plugin "TablePress" is a plugin to create and manage tables on WordPress site. TablePress contains a vulnerability where XML external entity (XXE) references are not properly restricted (CWE-611).

Yuji Tounai of NTT Communications Corporation reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 5.0 (Medium) [IPA Score]
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: None
  • Scope: Changed
  • Confidentiality Impact: Low
  • Integrity Impact: None
  • Availability Impact: None
CVSS V2 Severity:
Base Metrics 4.0 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Low
  • Authentication: Single Instance
  • Confidentiality Impact: Partial
  • Integrity Impact: None
  • Availability Impact: None
Affected Products

  • TablePress prior to version 1.8.1


An arbitrary file on the server may be accessed by users who can access the configuration page of the plugin (users with Author or higher role).

[Update the plugin]
Update the plugin according to the information provided by the developer.
Vendor Information

CWE (What is CWE?)

  1. No Mapping(CWE-Other) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2017-10889

  1. JVN : JVN#05398317
  2. National Vulnerability Database (NVD) : CVE-2017-10889
Revision History

  • [2017/11/14]
      Web page published
  • [2018/03/07]
      References : Content was added