cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches fortablesome tablesome

Direction: ascending
Jun 07, 2024

Tablesome – Responsive Table, Email Log, Form Automation – Contact Form 7, Elementor, WPForms, Gravity Forms, Fluen # CVE-2023-1890

CVE, Research URL

CVE-2023-1890

Date
May 15, 2023
Research Description
The Tablesome WordPress plugin before 1.0.9 does not escape various generated URLs, before outputting them in attributes when some notices are displayed, leading to Reflected Cross-Site Scripting
Affected versions
max 1.0.15.
Status
vulnerable

Tablesome – Responsive Table, Email Log, Form Automation – Contact Form 7, Elementor, WPForms, Gravity Forms, Fluen # CVE-2024-29110

CVE, Research URL

CVE-2024-29110

Date
Mar 19, 2024
Research Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pauple Table & Contact Form 7 Database – Tablesome allows Reflected XSS.This issue affects Table & Contact Form 7 Database – Tablesome: from n/a through 1.0.27.
Affected versions
max 1.0.28.
Status
vulnerable

Tablesome – Responsive Table, Email Log, Form Automation – Contact Form 7, Elementor, WPForms, Gravity Forms, Fluen # CVE-2024-31388

CVE, Research URL

CVE-2024-31388

Date
Apr 15, 2024
Research Description
Cross-Site Request Forgery (CSRF) vulnerability in Pauple Table & Contact Form 7 Database – Tablesome.This issue affects Table & Contact Form 7 Database – Tablesome: from n/a through 1.0.25.
Affected versions
max 1.0.26.
Status
vulnerable

Tablesome – Responsive Table, Email Log, Form Automation – Contact Form 7, Elementor, WPForms, Gravity Forms, Fluen # c20619462e6ffeb5614bfd5483ca5b525b7c1fa6

Date
Feb 28, 2022
Research Description
Tablesome &#8211; Responsive Table, Woocommerce Automation, Email Log, Form Automation &#8211; Contact Form 7, Elementor, WPForms, Forminator [tablesome] < 1.0.9 WordPress Table & Contact Form 7 Database – Tablesome – Data Table & Contact Form 7 Database (CFDB7) Plugin plugin < 0.6.7 - Toggle The Debug Mode via Cross-Site Request Forgery (CSRF) vulnerability Toggle The Debug Mode via Cross-Site Request Forgery (CSRF) vulnerability discovered in WordPress Table & Contact Form 7 Database – Tablesome – Data Table & Contact Form 7 Database (CFDB7) Plugin plugin (versions < 0.6.7).
Affected versions
max 1.0.9.
Status
vulnerable
Jul 08, 2024

Tablesome &#8211; Responsive Table, Email Log, Form Automation &#8211; Contact Form 7, Elementor, WPForms, Gravity Forms, Fluen # CVE-2024-37498

CVE, Research URL

CVE-2024-37498

Date
Jul 10, 2024
Research Description
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Pauple Table & Contact Form 7 Database – Tablesome.This issue affects Table & Contact Form 7 Database – Tablesome: from n/a through 1.0.33.
Affected versions
max 1.0.34.
Status
vulnerable
Nov 15, 2024

Tablesome &#8211; Responsive Table, Email Log, Form Automation &#8211; Contact Form 7, Elementor, WPForms, Gravity Forms, Fluen # CVE-2022-4974

CVE, Research URL

CVE-2022-4974

Date
Oct 16, 2024
Research Description
The Freemius SDK, as used by hundreds of WordPress plugin and theme developers, was vulnerable to Cross-Site Request Forgery and Information disclosure due to missing capability checks and nonce protection on the _get_debug_log, _get_db_option, and the _set_db_option functions in versions up to, and including 2.4.2. Any WordPress plugin or theme running a version of Freemius less than 2.4.3 is vulnerable.
Affected versions
max 0.6.7.
Status
vulnerable
Nov 10, 2025

Tablesome &#8211; Responsive Table, Email Log, Form Automation &#8211; Contact Form 7, Elementor, WPForms, Gravity Forms, Fluen # CVE-2025-11499

CVE, Research URL

CVE-2025-11499

Date
Nov 01, 2025
Research Description
The Tablesome Table – Contact Form DB – WPForms, CF7, Gravity, Forminator, Fluent plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the set_featured_image_from_external_url() function in all versions up to, and including, 1.1.32. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible in configurations where unauthenticated users have been provided with a method for adding featured images, and the workflow trigger is created.
Affected versions
max 1.3.33.
Status
vulnerable