Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8548: CWE-862 Missing Authorization in cagdasdag KB Support – WordPress Help Desk and Knowledge Base

0
High
VulnerabilityCVE-2024-8548cvecve-2024-8548cwe-862
Published: Tue Oct 01 2024 (10/01/2024, 07:30:12 UTC)
Source: CVE Database V5
Vendor/Project: cagdasdag
Product: KB Support – WordPress Help Desk and Knowledge Base

Description

CVE-2024-8548 is a high-severity vulnerability in the KB Support – WordPress Help Desk and Knowledge Base plugin allowing authenticated users with Subscriber-level access or higher to perform unauthorized administrative actions. Due to missing authorization checks, attackers can modify tickets, update post statuses, delete posts, add notes, and manage ticket participants without proper permissions. This vulnerability affects all versions up to and including 1. 6. 6. Exploitation requires no user interaction beyond authentication and can lead to significant confidentiality and integrity breaches. Although no exploits are currently known in the wild, the ease of exploitation and impact make this a critical concern for organizations using this plugin. Immediate patching or mitigation is advised to prevent unauthorized data manipulation and potential disruption of help desk operations.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:06:22 UTC

Technical Analysis

CVE-2024-8548 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the KB Support – WordPress Help Desk and Knowledge Base plugin developed by cagdasdag. The flaw exists in all versions up to 1.6.6 and arises from the absence of proper capability checks on multiple functions within the plugin. This security gap allows authenticated users with minimal privileges (Subscriber-level or higher) to bypass intended access controls and perform administrative actions typically reserved for higher privilege roles. Specifically, attackers can reply to arbitrary support tickets, change the status of any post, delete posts, add notes to tickets, flag or unflag tickets, and add or remove participants from tickets. The vulnerability is remotely exploitable over the network without requiring user interaction beyond authentication, making it relatively easy to abuse. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality and integrity, while availability remains unaffected. No public exploits have been reported yet, but the vulnerability poses a significant risk to the integrity and confidentiality of support ticket data and overall help desk management. The root cause is the missing authorization checks that should validate whether the authenticated user has the necessary permissions before performing sensitive operations.

Potential Impact

The vulnerability allows unauthorized modification and deletion of help desk tickets and posts, which can lead to severe confidentiality breaches, such as exposure or alteration of sensitive customer support information. Integrity is heavily impacted as attackers can manipulate ticket statuses, add misleading notes, or remove legitimate participants, potentially disrupting support workflows and damaging organizational reputation. Although availability is not directly affected, the operational impact on help desk functionality can indirectly degrade service quality. Organizations relying on this plugin for customer support risk data loss, misinformation, and unauthorized access to sensitive communications. Attackers with low-level access can escalate their influence within the help desk system, undermining trust and potentially facilitating further attacks or social engineering. The ease of exploitation and broad scope of affected versions increase the likelihood of targeted attacks, especially in environments where multiple users have Subscriber-level access.

Mitigation Recommendations

Organizations should immediately update the KB Support – WordPress Help Desk and Knowledge Base plugin to a patched version once available. In the absence of an official patch, administrators should restrict Subscriber-level user capabilities or temporarily disable the plugin to prevent exploitation. Implementing strict role-based access controls and auditing user permissions can reduce risk exposure. Monitoring logs for unusual ticket modifications or administrative actions by low-privilege users can help detect exploitation attempts. Additionally, applying a Web Application Firewall (WAF) with custom rules to block suspicious requests targeting the plugin’s administrative functions may provide temporary protection. Regularly reviewing and minimizing the number of users with Subscriber or higher privileges can limit the attack surface. Finally, organizations should maintain backups of help desk data to enable recovery in case of data tampering or deletion.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-09-06T19:19:03.349Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c2cb7ef31ef0b560c08

Added to database: 2/25/2026, 9:39:56 PM

Last enriched: 2/26/2026, 4:06:22 AM

Last updated: 2/26/2026, 7:43:11 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats