Critical Severity Vulnerability
This vulnerability has been rated as Critical severity. Immediate action is recommended.
CVE-2026-4119
CriticalVulnerability Description
The Create DB Tables plugin for WordPress is vulnerable to authorization bypass in all versions up to and including 1.2.1. The plugin registers admin_post action hooks for creating tables (admin_post_add_table) and deleting tables (admin_post_delete_db_table) without implementing any capability checks via current_user_can() or nonce verification via wp_verify_nonce()/check_admin_referer(). The admin_post hook only requires the user to be logged in, meaning any authenticated user including Subscribers can access these endpoints. The cdbt_delete_db_table() function takes a user-supplied table name from $_POST['db_table'] and executes a DROP TABLE SQL query, allowing any authenticated attacker to delete any database table including critical WordPress core tables such as wp_users or wp_options. The cdbt_create_new_table() function similarly allows creating arbitrary tables. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary database tables and delete any existing database table, potentially destroying the entire WordPress installation.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
References & Resources
-
https://plugins.trac.wordpress.org/browser/create-db-tables/tags/1.2.1/create-db-tables.php#L370security@wordfence.com
-
https://plugins.trac.wordpress.org/browser/create-db-tables/tags/1.2.1/create-db-tables.php#L376security@wordfence.com
-
https://plugins.trac.wordpress.org/browser/create-db-tables/tags/1.2.1/create-db-tables.php#L405security@wordfence.com
-
https://plugins.trac.wordpress.org/browser/create-db-tables/tags/1.2.1/create-db-tables.php#L408security@wordfence.com
-
https://plugins.trac.wordpress.org/browser/create-db-tables/tags/1.2.1/create-new-table.php#L14security@wordfence.com
-
https://plugins.trac.wordpress.org/browser/create-db-tables/tags/1.2.1/create-new-table.php#L69security@wordfence.com
-
https://plugins.trac.wordpress.org/browser/create-db-tables/trunk/create-db-tables.php#L370security@wordfence.com
-
https://plugins.trac.wordpress.org/browser/create-db-tables/trunk/create-db-tables.php#L376security@wordfence.com
-
https://plugins.trac.wordpress.org/browser/create-db-tables/trunk/create-db-tables.php#L405security@wordfence.com
-
https://plugins.trac.wordpress.org/browser/create-db-tables/trunk/create-db-tables.php#L408security@wordfence.com
-
https://plugins.trac.wordpress.org/browser/create-db-tables/trunk/create-new-table.php#L14security@wordfence.com
-
https://plugins.trac.wordpress.org/browser/create-db-tables/trunk/create-new-table.php#L69security@wordfence.com
-
https://www.wordfence.com/threat-intel/vulnerabilities/id/d1a3bc4b-cc17-4728-b242-13841b5f7660?source=cvesecurity@wordfence.com
Severity Details
Weakness Type (CWE)
Missing Authorization
- Description
- The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
- Exploit Likelihood
- High
- Typical Severity
- High
- OWASP Top 10
- A01:2021-Broken Access Control
- Abstraction Level
- Class
Key Information
- Published Date
- April 22, 2026
