Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13568: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in techjewel Fluent Support – Helpdesk & Customer Support Ticket System

0
High
VulnerabilityCVE-2024-13568cvecve-2024-13568cwe-200
Published: Sat Mar 01 2025 (03/01/2025, 04:21:47 UTC)
Source: CVE Database V5
Vendor/Project: techjewel
Product: Fluent Support – Helpdesk & Customer Support Ticket System

Description

CVE-2024-13568 is a high-severity vulnerability in the Fluent Support – Helpdesk & Customer Support Ticket System WordPress plugin, affecting all versions up to 1. 8. 5. It allows unauthenticated attackers to access sensitive information stored insecurely in the /wp-content/uploads/fluent-support directory, including file attachments from support tickets. The vulnerability arises from improper access controls on the 'fluent-support' directory, leading to exposure of confidential data without requiring authentication or user interaction. Exploitation requires only network access to the affected WordPress site. Although no known exploits are currently active in the wild, the vulnerability has a CVSS score of 7. 5, indicating a significant risk to confidentiality. Organizations using this plugin should prioritize patching or mitigating this issue to prevent unauthorized data disclosure. The threat primarily impacts WordPress sites using this plugin globally, with higher risk in countries with widespread WordPress adoption and significant use of this support system.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:26:23 UTC

Technical Analysis

CVE-2024-13568 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) found in the Fluent Support – Helpdesk & Customer Support Ticket System plugin for WordPress. This plugin, widely used for managing customer support tickets, stores file attachments and other sensitive data in the /wp-content/uploads/fluent-support directory. Due to improper access controls, all versions up to and including 1.8.5 allow unauthenticated attackers to directly access this directory and retrieve sensitive files. The vulnerability does not require any authentication or user interaction, making it trivially exploitable by anyone with network access to the affected WordPress site. The exposed data can include confidential customer information, support ticket attachments, and potentially personally identifiable information (PII), leading to privacy violations and compliance risks. The CVSS v3.1 base score is 7.5, reflecting high severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity or availability impact (I:N/A:N). There are no known public exploits at this time, but the vulnerability is publicly disclosed and should be considered a significant risk. The root cause is the lack of proper access restrictions on the plugin's upload directory, which is accessible via direct URL enumeration or guessing. This vulnerability highlights the importance of secure file storage and access control in web applications, especially those handling sensitive customer data.

Potential Impact

The primary impact of CVE-2024-13568 is the unauthorized disclosure of sensitive information, including customer support ticket attachments that may contain personal data, confidential business information, or other sensitive content. This exposure can lead to privacy breaches, regulatory non-compliance (e.g., GDPR, CCPA), reputational damage, and potential legal liabilities for affected organizations. Since the vulnerability allows unauthenticated remote attackers to access files directly, it increases the attack surface and risk of data leakage without requiring sophisticated exploitation techniques. Organizations relying on the Fluent Support plugin for customer support risk exposing their clients' sensitive data, undermining trust and potentially causing financial losses. Additionally, attackers could use the exposed information for further targeted attacks such as phishing or social engineering. The vulnerability does not impact system integrity or availability, but the confidentiality breach alone is significant. Given the widespread use of WordPress and the popularity of support plugins, the scope of affected systems is considerable, especially for businesses that handle sensitive customer interactions through this plugin.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting direct access to the /wp-content/uploads/fluent-support directory. This can be achieved by configuring web server rules (e.g., .htaccess for Apache, location blocks for Nginx) to deny or restrict access to this directory except for authorized users or internal processes. 2. Implement strict file permissions on the uploads directory to prevent unauthorized read access. 3. If possible, move sensitive file storage outside of the web root or use access-controlled storage mechanisms. 4. Monitor web server logs for unusual or repeated access attempts to the fluent-support upload directory to detect potential exploitation attempts. 5. Update the Fluent Support plugin to a patched version once available from the vendor, as this is the definitive fix for the vulnerability. 6. Employ a Web Application Firewall (WAF) to block suspicious requests targeting the vulnerable directory. 7. Educate administrators and developers about secure file handling practices and the importance of access controls on uploaded content. 8. Conduct regular security audits and vulnerability scans on WordPress installations to identify similar misconfigurations or exposures. 9. Review and sanitize all uploaded files to ensure no sensitive data is unnecessarily stored or exposed. 10. Consider implementing authentication checks or token-based access controls for sensitive file downloads within the plugin.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-21T03:19:33.132Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e61b7ef31ef0b59f417

Added to database: 2/25/2026, 9:49:21 PM

Last enriched: 2/25/2026, 11:26:23 PM

Last updated: 2/26/2026, 9:43:45 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats