{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T09:16:32.683","vulnerabilities":[{"cve":{"id":"CVE-2025-12845","sourceIdentifier":"security@wordfence.com","published":"2026-02-19T07:17:28.940","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The Tablesome Table – Contact Form DB – WPForms, CF7, Gravity, Forminator, Fluent plugin for WordPress is vulnerable to unauthorized access of data that leads to privilege escalation due to a missing capability check on the get_table_data() function in versions 0.5.4 to 1.2.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve plugin table data that can expose email log information. Attackers can leverage this on sites where the table log is enabled in order to trigger a password reset and obtain the reset key."},{"lang":"es","value":"El plugin Tablesome Table – Contact Form DB – WPForms, CF7, Gravity, Forminator, Fluent para WordPress es vulnerable a acceso no autorizado a datos que conduce a escalada de privilegios debido a una verificación de capacidad faltante en la función get_table_data() en las versiones 0.5.4 a 1.2.1. Esto hace posible que atacantes autenticados, con acceso de nivel Suscriptor y superior, recuperen datos de la tabla del plugin que pueden exponer información de registro de correo electrónico. Los atacantes pueden aprovechar esto en sitios donde el registro de tabla está habilitado para activar un restablecimiento de contraseña y obtener la clave de restablecimiento."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security@wordfence.com","type":"Primary","description":[{"lang":"en","value":"CWE-862"}]}],"references":[{"url":"https://plugins.trac.wordpress.org/changeset/3447966","source":"security@wordfence.com"},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/a22b2724-2541-4345-bd42-e8a5844f3f0a?source=cve","source":"security@wordfence.com"}]}}]}