CVE-2024-13607: CWE-639 Authorization Bypass Through User-Controlled Key in rabilal JS Help Desk – The Ultimate Help Desk & Support Plugin
CVE-2024-13607 is an authorization bypass vulnerability in the JS Help Desk WordPress plugin up to version 2. 8. 8. It arises from an insecure direct object reference (IDOR) due to missing validation on a user-controlled key parameter named 'exportusereraserequest'. Authenticated users with Subscriber-level permissions or higher can exploit this flaw to export ticket data belonging to any user, potentially exposing sensitive information. The vulnerability does not require user interaction beyond authentication and has a CVSS score of 4. 3 (medium severity). There are no known exploits in the wild currently, and no official patches have been released yet. Organizations using this plugin should prioritize access control reviews and consider restricting plugin usage until a fix is available. This issue primarily affects WordPress sites using this specific plugin, which is more common in English-speaking and developed countries with widespread WordPress adoption.
AI Analysis
Technical Summary
CVE-2024-13607 is a security vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the JS Help Desk – The Ultimate Help Desk & Support Plugin for WordPress, versions up to and including 2.8.8. The flaw stems from an insecure direct object reference (IDOR) caused by insufficient validation of a user-controlled parameter named 'exportusereraserequest'. This parameter is used to export ticket data, but the plugin fails to verify that the requesting user has the appropriate authorization to access the specified data. As a result, any authenticated user with at least Subscriber-level permissions can manipulate this key to export ticket information belonging to other users, bypassing intended access controls. The vulnerability requires authentication but no additional user interaction, and it can be exploited remotely over the network. The CVSS v3.1 base score is 4.3, reflecting low complexity of attack and limited impact on confidentiality only, with no impact on integrity or availability. No patches or official fixes have been published at the time of disclosure, and no known exploits have been observed in the wild. The plugin is used primarily in WordPress environments, which are prevalent globally, especially in small to medium businesses and support organizations. The vulnerability highlights the importance of proper authorization checks on user-controlled inputs, especially in plugins handling sensitive support ticket data.
Potential Impact
The primary impact of CVE-2024-13607 is the unauthorized disclosure of support ticket data, which may contain sensitive or personally identifiable information. This breach of confidentiality can lead to privacy violations, reputational damage, and potential regulatory non-compliance for organizations using the affected plugin. Since the vulnerability allows users with minimal privileges (Subscriber-level) to access data beyond their authorization, insider threats or compromised low-privilege accounts could be leveraged to harvest sensitive information. However, the vulnerability does not affect data integrity or system availability, limiting the scope of damage. Organizations relying on the JS Help Desk plugin for customer support risk exposure of confidential communications and user data, which could be exploited for social engineering or further attacks. The lack of known exploits reduces immediate risk, but the ease of exploitation and widespread use of WordPress plugins means the threat could escalate if weaponized. The impact is more significant for organizations handling sensitive or regulated data through their help desk systems.
Mitigation Recommendations
To mitigate CVE-2024-13607, organizations should immediately audit and restrict access to the JS Help Desk plugin, limiting it to trusted users only. Administrators should review user roles and permissions to ensure that Subscriber-level accounts do not have unnecessary access to sensitive functions. Implementing Web Application Firewall (WAF) rules to detect and block suspicious requests manipulating the 'exportusereraserequest' parameter can provide temporary protection. Monitoring logs for unusual export activity or access patterns is recommended to detect exploitation attempts. Until an official patch is released, consider disabling the export functionality or the entire plugin if feasible. Developers and site administrators should apply the principle of least privilege and enforce strict server-side authorization checks on all user-controlled inputs. Regularly updating WordPress and plugins, and subscribing to vendor security advisories, will ensure timely application of future fixes. Additionally, educating users about the risks of privilege escalation and enforcing strong authentication can reduce exploitation likelihood.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, France, Netherlands, India, Brazil, South Africa
CVE-2024-13607: CWE-639 Authorization Bypass Through User-Controlled Key in rabilal JS Help Desk – The Ultimate Help Desk & Support Plugin
Description
CVE-2024-13607 is an authorization bypass vulnerability in the JS Help Desk WordPress plugin up to version 2. 8. 8. It arises from an insecure direct object reference (IDOR) due to missing validation on a user-controlled key parameter named 'exportusereraserequest'. Authenticated users with Subscriber-level permissions or higher can exploit this flaw to export ticket data belonging to any user, potentially exposing sensitive information. The vulnerability does not require user interaction beyond authentication and has a CVSS score of 4. 3 (medium severity). There are no known exploits in the wild currently, and no official patches have been released yet. Organizations using this plugin should prioritize access control reviews and consider restricting plugin usage until a fix is available. This issue primarily affects WordPress sites using this specific plugin, which is more common in English-speaking and developed countries with widespread WordPress adoption.
AI-Powered Analysis
Technical Analysis
CVE-2024-13607 is a security vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the JS Help Desk – The Ultimate Help Desk & Support Plugin for WordPress, versions up to and including 2.8.8. The flaw stems from an insecure direct object reference (IDOR) caused by insufficient validation of a user-controlled parameter named 'exportusereraserequest'. This parameter is used to export ticket data, but the plugin fails to verify that the requesting user has the appropriate authorization to access the specified data. As a result, any authenticated user with at least Subscriber-level permissions can manipulate this key to export ticket information belonging to other users, bypassing intended access controls. The vulnerability requires authentication but no additional user interaction, and it can be exploited remotely over the network. The CVSS v3.1 base score is 4.3, reflecting low complexity of attack and limited impact on confidentiality only, with no impact on integrity or availability. No patches or official fixes have been published at the time of disclosure, and no known exploits have been observed in the wild. The plugin is used primarily in WordPress environments, which are prevalent globally, especially in small to medium businesses and support organizations. The vulnerability highlights the importance of proper authorization checks on user-controlled inputs, especially in plugins handling sensitive support ticket data.
Potential Impact
The primary impact of CVE-2024-13607 is the unauthorized disclosure of support ticket data, which may contain sensitive or personally identifiable information. This breach of confidentiality can lead to privacy violations, reputational damage, and potential regulatory non-compliance for organizations using the affected plugin. Since the vulnerability allows users with minimal privileges (Subscriber-level) to access data beyond their authorization, insider threats or compromised low-privilege accounts could be leveraged to harvest sensitive information. However, the vulnerability does not affect data integrity or system availability, limiting the scope of damage. Organizations relying on the JS Help Desk plugin for customer support risk exposure of confidential communications and user data, which could be exploited for social engineering or further attacks. The lack of known exploits reduces immediate risk, but the ease of exploitation and widespread use of WordPress plugins means the threat could escalate if weaponized. The impact is more significant for organizations handling sensitive or regulated data through their help desk systems.
Mitigation Recommendations
To mitigate CVE-2024-13607, organizations should immediately audit and restrict access to the JS Help Desk plugin, limiting it to trusted users only. Administrators should review user roles and permissions to ensure that Subscriber-level accounts do not have unnecessary access to sensitive functions. Implementing Web Application Firewall (WAF) rules to detect and block suspicious requests manipulating the 'exportusereraserequest' parameter can provide temporary protection. Monitoring logs for unusual export activity or access patterns is recommended to detect exploitation attempts. Until an official patch is released, consider disabling the export functionality or the entire plugin if feasible. Developers and site administrators should apply the principle of least privilege and enforce strict server-side authorization checks on all user-controlled inputs. Regularly updating WordPress and plugins, and subscribing to vendor security advisories, will ensure timely application of future fixes. Additionally, educating users about the risks of privilege escalation and enforcing strong authentication can reduce exploitation likelihood.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-21T20:09:50.331Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e64b7ef31ef0b59f5f1
Added to database: 2/25/2026, 9:49:24 PM
Last enriched: 2/25/2026, 11:28:12 PM
Last updated: 2/26/2026, 7:41:01 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.