SQL Injection Vulnerability in WordPress HelpDesk & Support Plugin
CVE-2024-0594

8.8HIGH

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
10 February 2024

Summary

The Awesome Support – WordPress HelpDesk & Support Plugin is susceptible to union-based SQL Injection through the 'q' parameter of the wpas_get_users action. This vulnerability arises from inadequate escaping of user-supplied inputs and insufficient preparation within the SQL query. Authenticated attackers with subscriber-level access and above can exploit this flaw to inject additional SQL commands surrounding existing queries, thereby gaining access to sensitive data stored in the database. Users of all versions up to and including 6.1.7 are at risk, prompting urgent attention to mitigate potential data breaches.

Affected Version(s)

Awesome Support – WordPress HelpDesk & Support Plugin * <= 6.1.7

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Krzysztof Zając
.
🍪 This website uses cookies, like every other website on the internet 😕 By using our website, you consent to the use of cookies.