Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10658: CWE-307 Improper Restriction of Excessive Authentication Attempts in psmplugins SupportCandy – Helpdesk & Customer Support Ticket System

0
Medium
VulnerabilityCVE-2025-10658cvecve-2025-10658cwe-307
Published: Sat Sep 20 2025 (09/20/2025, 06:43:18 UTC)
Source: CVE Database V5
Vendor/Project: psmplugins
Product: SupportCandy – Helpdesk & Customer Support Ticket System

Description

The SupportCandy – Helpdesk & Customer Support Ticket System plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 3.3.7. This is due to missing rate limiting on the OTP verification for guest login. This makes it possible for unauthenticated attackers to bypass authentication and gain unauthorized access to customer support tickets by brute forcing the 6-digit OTP code.

AI-Powered Analysis

AILast updated: 09/28/2025, 00:47:21 UTC

Technical Analysis

CVE-2025-10658 is a medium-severity vulnerability affecting the SupportCandy – Helpdesk & Customer Support Ticket System plugin for WordPress, developed by psmplugins. The vulnerability arises from improper restriction of excessive authentication attempts (CWE-307) on the plugin's OTP (One-Time Password) verification mechanism for guest logins. Specifically, the plugin lacks rate limiting on the 6-digit OTP verification process, allowing unauthenticated attackers to perform brute force attacks against the OTP input. Since the OTP is only 6 digits, the brute force space is limited to 1 million possibilities, which can be tested rapidly without any throttling or lockout mechanisms. This flaw enables attackers to bypass authentication controls and gain unauthorized access to customer support tickets, potentially exposing sensitive customer information and support interactions. The vulnerability affects all versions up to and including 3.3.7 of the plugin. The CVSS v3.1 base score is 6.5 (medium), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and impacts on confidentiality and integrity but no availability impact. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability was publicly disclosed on September 20, 2025.

Potential Impact

For European organizations using WordPress sites with the SupportCandy plugin, this vulnerability poses a significant risk to the confidentiality and integrity of customer support data. Unauthorized access to support tickets can lead to exposure of personally identifiable information (PII), sensitive business communications, and potentially confidential customer data. This could result in regulatory non-compliance under GDPR, reputational damage, and loss of customer trust. Since the vulnerability allows unauthenticated attackers to bypass authentication without user interaction, the risk is elevated, especially for organizations relying on SupportCandy for critical customer support workflows. The impact is particularly concerning for sectors handling sensitive data such as finance, healthcare, and telecommunications. However, the lack of availability impact means service disruption is unlikely. The absence of known exploits in the wild provides a window for mitigation before active exploitation occurs.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence and version of the SupportCandy plugin. Until an official patch is released, administrators should consider disabling guest login functionality or the SupportCandy plugin entirely if feasible. Implementing web application firewall (WAF) rules to detect and block rapid repeated OTP verification attempts can help mitigate brute force attacks. Monitoring logs for unusual authentication attempts and setting up alerting for repeated OTP failures is advised. Organizations should also enforce multi-factor authentication (MFA) for administrative access to WordPress and limit access to support ticket data to authorized personnel only. Once a patch becomes available, prompt application of updates is critical. Additionally, reviewing and minimizing the exposure of sensitive data in support tickets can reduce potential damage from unauthorized access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-17T21:59:39.750Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ce4e4eab7f779c79ff311b

Added to database: 9/20/2025, 6:48:46 AM

Last enriched: 9/28/2025, 12:47:21 AM

Last updated: 11/4/2025, 4:32:01 PM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats