[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":17,"vulnerability-25887":24},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},["Island",18],{"key":19,"params":20,"result":22},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":21},"{\"text-color\":\"gray\"}",{"head":23},{},{"id":25,"detectable_with":26,"vuln_details":33,"vuln_id":51,"name":52,"published":53,"updated":34},25887,{"tool":27,"engine":30},{"id":28,"name":29},1,"Network Scanner",{"id":31,"name":32},2,"Nuclei",{"id":25,"codename":34,"description":34,"severity":35,"risk_description":36,"public_description":37,"public_recommendation":38,"recommendation":34,"references":39,"cvssv3":44,"epss_score":45,"epss_percentile":46,"cve":47,"in_cisa_catalog":49,"date":50,"software_type":34,"vendor":34,"product":34,"ptt_exploit_capabilities":34},null,"high","Successful exploitation could allow an attacker to read sensitive files on the server.","The PHPSpreadsheet library used by the plugin is affected by an XXE as the security scanner that prevents XXE attacks in the XLSX reader can be bypassed by slightly modifying the XML structure, utilizing white spaces. On servers that allow users to upload their own Excel (XLSX) sheets, Server files, and sensitive information can be disclosed by providing a crafted sheet.","Upgrade TablePress to version 2.4.3 or later to mitigate the vulnerability.",[40,41,42,43],"https://shaheen.beaconred.net/research/2024/10/25/phpspreadsheet-xxe.html","https://wpscan.com/vulnerability/c9c13e5b-22ac-44c1-aca7-e2b34238e045/","https://wordpress.org/plugins/tablepress/","https://nvd.nist.gov/vuln/detail/CVE-2024-45293",7.5,0.71632,0.98726,[48],"CVE-2024-45293",false,"2024-10-07T00:00:00Z","NETSCAN-NUCLEI-CVE-CVE-2024-45293","TablePress \u003C 2.4.3 - XXE Injection","2024-12-12T00:00:00Z"]