CVE-2024-13552: CWE-285 Improper Authorization in supportcandy SupportCandy – Helpdesk & Customer Support Ticket System
CVE-2024-13552 is a medium severity vulnerability in the SupportCandy Helpdesk & Customer Support Ticket System WordPress plugin. It involves an Insecure Direct Object Reference (IDOR) due to improper authorization checks on file attachments. Authenticated attackers can exploit this flaw to download attachments from support tickets they do not own. If the plugin is configured to allow guest tickets, unauthenticated attackers may also exploit this vulnerability. The issue affects all versions up to and including 3. 3. 0. The vulnerability does not impact integrity or availability but compromises confidentiality of potentially sensitive attachments. No known exploits are currently reported in the wild. Organizations using SupportCandy should prioritize patching or mitigating this issue to prevent unauthorized data disclosure.
AI Analysis
Technical Summary
CVE-2024-13552 is an authorization vulnerability classified under CWE-285 affecting the SupportCandy – Helpdesk & Customer Support Ticket System WordPress plugin. The flaw arises from missing validation on a user-controlled key parameter during file upload and retrieval processes. This lack of proper access control allows authenticated users to bypass restrictions and download attachments associated with support tickets that they do not own, constituting an Insecure Direct Object Reference (IDOR) vulnerability. Furthermore, if the administrator enables guest ticket submissions, unauthenticated users can exploit this vulnerability to access attachments without any authentication. The vulnerability affects all versions up to 3.3.0 and is rated with a CVSS 3.1 base score of 4.3 (medium severity), reflecting its network attack vector, low complexity, and lack of user interaction, but requiring at least low privileges for exploitation in the authenticated scenario. The vulnerability impacts confidentiality but does not affect integrity or availability of the system. No patches are currently linked, and no known exploits have been reported in the wild. The root cause is insufficient authorization checks on file access endpoints, allowing unauthorized access to sensitive ticket attachments.
Potential Impact
The primary impact of CVE-2024-13552 is unauthorized disclosure of sensitive information contained in support ticket attachments. This can lead to leakage of confidential customer data, internal communications, or proprietary information, potentially resulting in reputational damage, regulatory compliance violations (such as GDPR or HIPAA), and loss of customer trust. Since the vulnerability allows authenticated users to access other users' attachments, insider threats or compromised accounts can be leveraged to escalate data exposure. If guest tickets are enabled, the risk extends to unauthenticated attackers, increasing the attack surface significantly. Although the vulnerability does not affect system integrity or availability, the confidentiality breach alone can have serious consequences for organizations relying on SupportCandy for customer support. The lack of known exploits suggests limited active exploitation currently, but the ease of exploitation and network accessibility make it a viable target for attackers.
Mitigation Recommendations
Organizations using the SupportCandy plugin should immediately assess their exposure and take the following specific actions: 1) Upgrade to a patched version once available from the vendor; monitor official SupportCandy channels for updates. 2) Temporarily disable guest ticket submissions to prevent unauthenticated exploitation. 3) Implement strict access controls and review user permissions to minimize the number of users with ticket access. 4) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests attempting to access unauthorized attachments. 5) Conduct thorough audits of existing ticket attachments to identify any potential data leakage. 6) Educate support staff about the risk and encourage vigilance for unusual access patterns. 7) If patching is delayed, consider custom plugin modifications to enforce authorization checks on file access endpoints. 8) Monitor logs for anomalous download activity related to ticket attachments. These targeted mitigations go beyond generic advice by focusing on configuration changes, monitoring, and temporary controls until an official patch is released.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, India, France, Netherlands, Brazil, Japan
CVE-2024-13552: CWE-285 Improper Authorization in supportcandy SupportCandy – Helpdesk & Customer Support Ticket System
Description
CVE-2024-13552 is a medium severity vulnerability in the SupportCandy Helpdesk & Customer Support Ticket System WordPress plugin. It involves an Insecure Direct Object Reference (IDOR) due to improper authorization checks on file attachments. Authenticated attackers can exploit this flaw to download attachments from support tickets they do not own. If the plugin is configured to allow guest tickets, unauthenticated attackers may also exploit this vulnerability. The issue affects all versions up to and including 3. 3. 0. The vulnerability does not impact integrity or availability but compromises confidentiality of potentially sensitive attachments. No known exploits are currently reported in the wild. Organizations using SupportCandy should prioritize patching or mitigating this issue to prevent unauthorized data disclosure.
AI-Powered Analysis
Technical Analysis
CVE-2024-13552 is an authorization vulnerability classified under CWE-285 affecting the SupportCandy – Helpdesk & Customer Support Ticket System WordPress plugin. The flaw arises from missing validation on a user-controlled key parameter during file upload and retrieval processes. This lack of proper access control allows authenticated users to bypass restrictions and download attachments associated with support tickets that they do not own, constituting an Insecure Direct Object Reference (IDOR) vulnerability. Furthermore, if the administrator enables guest ticket submissions, unauthenticated users can exploit this vulnerability to access attachments without any authentication. The vulnerability affects all versions up to 3.3.0 and is rated with a CVSS 3.1 base score of 4.3 (medium severity), reflecting its network attack vector, low complexity, and lack of user interaction, but requiring at least low privileges for exploitation in the authenticated scenario. The vulnerability impacts confidentiality but does not affect integrity or availability of the system. No patches are currently linked, and no known exploits have been reported in the wild. The root cause is insufficient authorization checks on file access endpoints, allowing unauthorized access to sensitive ticket attachments.
Potential Impact
The primary impact of CVE-2024-13552 is unauthorized disclosure of sensitive information contained in support ticket attachments. This can lead to leakage of confidential customer data, internal communications, or proprietary information, potentially resulting in reputational damage, regulatory compliance violations (such as GDPR or HIPAA), and loss of customer trust. Since the vulnerability allows authenticated users to access other users' attachments, insider threats or compromised accounts can be leveraged to escalate data exposure. If guest tickets are enabled, the risk extends to unauthenticated attackers, increasing the attack surface significantly. Although the vulnerability does not affect system integrity or availability, the confidentiality breach alone can have serious consequences for organizations relying on SupportCandy for customer support. The lack of known exploits suggests limited active exploitation currently, but the ease of exploitation and network accessibility make it a viable target for attackers.
Mitigation Recommendations
Organizations using the SupportCandy plugin should immediately assess their exposure and take the following specific actions: 1) Upgrade to a patched version once available from the vendor; monitor official SupportCandy channels for updates. 2) Temporarily disable guest ticket submissions to prevent unauthenticated exploitation. 3) Implement strict access controls and review user permissions to minimize the number of users with ticket access. 4) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests attempting to access unauthorized attachments. 5) Conduct thorough audits of existing ticket attachments to identify any potential data leakage. 6) Educate support staff about the risk and encourage vigilance for unusual access patterns. 7) If patching is delayed, consider custom plugin modifications to enforce authorization checks on file access endpoints. 8) Monitor logs for anomalous download activity related to ticket attachments. These targeted mitigations go beyond generic advice by focusing on configuration changes, monitoring, and temporary controls until an official patch is released.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-20T20:28:18.249Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e5fb7ef31ef0b59f1fc
Added to database: 2/25/2026, 9:49:19 PM
Last enriched: 2/25/2026, 11:58:33 PM
Last updated: 2/26/2026, 9:39:30 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.