CVE-2025-10658: CWE-307 Improper Restriction of Excessive Authentication Attempts in psmplugins SupportCandy – Helpdesk & Customer Support Ticket System
The SupportCandy – Helpdesk & Customer Support Ticket System plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 3.3.7. This is due to missing rate limiting on the OTP verification for guest login. This makes it possible for unauthenticated attackers to bypass authentication and gain unauthorized access to customer support tickets by brute forcing the 6-digit OTP code.
AI Analysis
Technical Summary
CVE-2025-10658 is a medium severity vulnerability affecting the SupportCandy – Helpdesk & Customer Support Ticket System plugin for WordPress, developed by psmplugins. The vulnerability arises from improper restriction of excessive authentication attempts (CWE-307) on the One-Time Password (OTP) verification mechanism used for guest login. Specifically, all versions up to and including 3.3.7 lack rate limiting on OTP verification, allowing unauthenticated attackers to perform brute force attacks against the 6-digit OTP code. Because the OTP is only six digits, the total possible combinations are 1,000,000, which is feasible to brute force if no rate limiting or lockout mechanisms are in place. Successful exploitation enables attackers to bypass authentication controls and gain unauthorized access to customer support tickets. This compromises confidentiality and integrity of sensitive customer data and support interactions. The vulnerability is remotely exploitable over the network without any privileges or user interaction, increasing its risk profile. Although no known exploits are currently reported in the wild, the ease of exploitation and the sensitive nature of the data accessible through the plugin make this a significant concern for organizations using SupportCandy. The CVSS v3.1 base score is 6.5 (medium), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and partial impact on confidentiality and integrity but no impact on availability. No patches or fixes have been linked yet, so affected organizations must take immediate mitigating actions to reduce risk.
Potential Impact
For European organizations using the SupportCandy plugin on WordPress sites, this vulnerability poses a direct threat to the confidentiality and integrity of customer support data. Unauthorized access to support tickets can lead to exposure of personally identifiable information (PII), sensitive business communications, and potentially credentials or other confidential information shared during support interactions. This can result in reputational damage, regulatory non-compliance (notably under GDPR), and potential financial losses. The ability to bypass authentication without user interaction or privileges means attackers can automate attacks at scale, increasing the likelihood of compromise. Organizations relying on SupportCandy for customer support risk data breaches that could affect customers across Europe, potentially triggering mandatory breach notifications and fines. Additionally, attackers gaining foothold through this vector could pivot to further attacks within the affected environment. The lack of known exploits in the wild currently provides a window for proactive defense, but the vulnerability’s characteristics suggest it could be weaponized quickly once discovered by malicious actors.
Mitigation Recommendations
1. Immediate mitigation should include implementing custom rate limiting or throttling on OTP verification endpoints at the web server or application firewall level to prevent brute force attempts. 2. Monitor logs for repeated failed OTP attempts and implement alerting for suspicious activity. 3. Temporarily disable guest login via OTP if feasible until an official patch is released. 4. Enforce multi-factor authentication (MFA) for all user roles where possible, reducing reliance on OTP for guest access. 5. Regularly update the SupportCandy plugin to the latest version once a patch addressing this vulnerability is released. 6. Conduct a thorough audit of access logs and support ticket data for signs of unauthorized access. 7. Educate support staff to recognize and report suspicious activity. 8. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block brute force patterns against OTP endpoints. 9. Engage with the vendor or community to obtain timely patches or workarounds. These steps go beyond generic advice by focusing on immediate compensating controls and proactive monitoring tailored to the nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-10658: CWE-307 Improper Restriction of Excessive Authentication Attempts in psmplugins SupportCandy – Helpdesk & Customer Support Ticket System
Description
The SupportCandy – Helpdesk & Customer Support Ticket System plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 3.3.7. This is due to missing rate limiting on the OTP verification for guest login. This makes it possible for unauthenticated attackers to bypass authentication and gain unauthorized access to customer support tickets by brute forcing the 6-digit OTP code.
AI-Powered Analysis
Technical Analysis
CVE-2025-10658 is a medium severity vulnerability affecting the SupportCandy – Helpdesk & Customer Support Ticket System plugin for WordPress, developed by psmplugins. The vulnerability arises from improper restriction of excessive authentication attempts (CWE-307) on the One-Time Password (OTP) verification mechanism used for guest login. Specifically, all versions up to and including 3.3.7 lack rate limiting on OTP verification, allowing unauthenticated attackers to perform brute force attacks against the 6-digit OTP code. Because the OTP is only six digits, the total possible combinations are 1,000,000, which is feasible to brute force if no rate limiting or lockout mechanisms are in place. Successful exploitation enables attackers to bypass authentication controls and gain unauthorized access to customer support tickets. This compromises confidentiality and integrity of sensitive customer data and support interactions. The vulnerability is remotely exploitable over the network without any privileges or user interaction, increasing its risk profile. Although no known exploits are currently reported in the wild, the ease of exploitation and the sensitive nature of the data accessible through the plugin make this a significant concern for organizations using SupportCandy. The CVSS v3.1 base score is 6.5 (medium), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and partial impact on confidentiality and integrity but no impact on availability. No patches or fixes have been linked yet, so affected organizations must take immediate mitigating actions to reduce risk.
Potential Impact
For European organizations using the SupportCandy plugin on WordPress sites, this vulnerability poses a direct threat to the confidentiality and integrity of customer support data. Unauthorized access to support tickets can lead to exposure of personally identifiable information (PII), sensitive business communications, and potentially credentials or other confidential information shared during support interactions. This can result in reputational damage, regulatory non-compliance (notably under GDPR), and potential financial losses. The ability to bypass authentication without user interaction or privileges means attackers can automate attacks at scale, increasing the likelihood of compromise. Organizations relying on SupportCandy for customer support risk data breaches that could affect customers across Europe, potentially triggering mandatory breach notifications and fines. Additionally, attackers gaining foothold through this vector could pivot to further attacks within the affected environment. The lack of known exploits in the wild currently provides a window for proactive defense, but the vulnerability’s characteristics suggest it could be weaponized quickly once discovered by malicious actors.
Mitigation Recommendations
1. Immediate mitigation should include implementing custom rate limiting or throttling on OTP verification endpoints at the web server or application firewall level to prevent brute force attempts. 2. Monitor logs for repeated failed OTP attempts and implement alerting for suspicious activity. 3. Temporarily disable guest login via OTP if feasible until an official patch is released. 4. Enforce multi-factor authentication (MFA) for all user roles where possible, reducing reliance on OTP for guest access. 5. Regularly update the SupportCandy plugin to the latest version once a patch addressing this vulnerability is released. 6. Conduct a thorough audit of access logs and support ticket data for signs of unauthorized access. 7. Educate support staff to recognize and report suspicious activity. 8. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block brute force patterns against OTP endpoints. 9. Engage with the vendor or community to obtain timely patches or workarounds. These steps go beyond generic advice by focusing on immediate compensating controls and proactive monitoring tailored to the nature of this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-17T21:59:39.750Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ce4e4eab7f779c79ff311b
Added to database: 9/20/2025, 6:48:46 AM
Last enriched: 9/20/2025, 6:49:50 AM
Last updated: 9/21/2025, 12:09:39 AM
Views: 8
Related Threats
CVE-2025-10758: Cross Site Scripting in htmly
MediumCVE-2025-9949: CWE-352 Cross-Site Request Forgery (CSRF) in webraketen Internal Links Manager
MediumCVE-2025-10489: CWE-862 Missing Authorization in brainstormforce SureForms – Drag and Drop Contact Form Builder – Multi-step Forms, Conversational Forms and more
MediumCVE-2025-10305: CWE-862 Missing Authorization in endisha Secure Passkeys
MediumCVE-2025-10181: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in dartiss Draft List
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.