Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13552: CWE-285 Improper Authorization in supportcandy SupportCandy – Helpdesk & Customer Support Ticket System

0
Medium
VulnerabilityCVE-2024-13552cvecve-2024-13552cwe-285
Published: Fri Mar 07 2025 (03/07/2025, 09:21:14 UTC)
Source: CVE Database V5
Vendor/Project: supportcandy
Product: SupportCandy – Helpdesk & Customer Support Ticket System

Description

CVE-2024-13552 is a medium severity vulnerability in the SupportCandy Helpdesk & Customer Support Ticket System WordPress plugin. It involves an Insecure Direct Object Reference (IDOR) due to improper authorization checks on file attachments. Authenticated attackers can exploit this flaw to download attachments from support tickets they do not own. If the plugin is configured to allow guest tickets, unauthenticated attackers may also exploit this vulnerability. The issue affects all versions up to and including 3. 3. 0. The vulnerability does not impact integrity or availability but compromises confidentiality of potentially sensitive attachments. No known exploits are currently reported in the wild. Organizations using SupportCandy should prioritize patching or mitigating this issue to prevent unauthorized data disclosure.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:58:33 UTC

Technical Analysis

CVE-2024-13552 is an authorization vulnerability classified under CWE-285 affecting the SupportCandy – Helpdesk & Customer Support Ticket System WordPress plugin. The flaw arises from missing validation on a user-controlled key parameter during file upload and retrieval processes. This lack of proper access control allows authenticated users to bypass restrictions and download attachments associated with support tickets that they do not own, constituting an Insecure Direct Object Reference (IDOR) vulnerability. Furthermore, if the administrator enables guest ticket submissions, unauthenticated users can exploit this vulnerability to access attachments without any authentication. The vulnerability affects all versions up to 3.3.0 and is rated with a CVSS 3.1 base score of 4.3 (medium severity), reflecting its network attack vector, low complexity, and lack of user interaction, but requiring at least low privileges for exploitation in the authenticated scenario. The vulnerability impacts confidentiality but does not affect integrity or availability of the system. No patches are currently linked, and no known exploits have been reported in the wild. The root cause is insufficient authorization checks on file access endpoints, allowing unauthorized access to sensitive ticket attachments.

Potential Impact

The primary impact of CVE-2024-13552 is unauthorized disclosure of sensitive information contained in support ticket attachments. This can lead to leakage of confidential customer data, internal communications, or proprietary information, potentially resulting in reputational damage, regulatory compliance violations (such as GDPR or HIPAA), and loss of customer trust. Since the vulnerability allows authenticated users to access other users' attachments, insider threats or compromised accounts can be leveraged to escalate data exposure. If guest tickets are enabled, the risk extends to unauthenticated attackers, increasing the attack surface significantly. Although the vulnerability does not affect system integrity or availability, the confidentiality breach alone can have serious consequences for organizations relying on SupportCandy for customer support. The lack of known exploits suggests limited active exploitation currently, but the ease of exploitation and network accessibility make it a viable target for attackers.

Mitigation Recommendations

Organizations using the SupportCandy plugin should immediately assess their exposure and take the following specific actions: 1) Upgrade to a patched version once available from the vendor; monitor official SupportCandy channels for updates. 2) Temporarily disable guest ticket submissions to prevent unauthenticated exploitation. 3) Implement strict access controls and review user permissions to minimize the number of users with ticket access. 4) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests attempting to access unauthorized attachments. 5) Conduct thorough audits of existing ticket attachments to identify any potential data leakage. 6) Educate support staff about the risk and encourage vigilance for unusual access patterns. 7) If patching is delayed, consider custom plugin modifications to enforce authorization checks on file access endpoints. 8) Monitor logs for anomalous download activity related to ticket attachments. These targeted mitigations go beyond generic advice by focusing on configuration changes, monitoring, and temporary controls until an official patch is released.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-20T20:28:18.249Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e5fb7ef31ef0b59f1fc

Added to database: 2/25/2026, 9:49:19 PM

Last enriched: 2/25/2026, 11:58:33 PM

Last updated: 2/26/2026, 9:39:30 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats