CVE-2025-10658: CWE-307 Improper Restriction of Excessive Authentication Attempts in psmplugins SupportCandy – Helpdesk & Customer Support Ticket System
The SupportCandy – Helpdesk & Customer Support Ticket System plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 3.3.7. This is due to missing rate limiting on the OTP verification for guest login. This makes it possible for unauthenticated attackers to bypass authentication and gain unauthorized access to customer support tickets by brute forcing the 6-digit OTP code.
AI Analysis
Technical Summary
CVE-2025-10658 is a medium-severity vulnerability affecting the SupportCandy – Helpdesk & Customer Support Ticket System plugin for WordPress, developed by psmplugins. The vulnerability arises from improper restriction of excessive authentication attempts (CWE-307) on the plugin's OTP (One-Time Password) verification mechanism for guest logins. Specifically, the plugin lacks rate limiting on the 6-digit OTP verification process, allowing unauthenticated attackers to perform brute force attacks against the OTP input. Since the OTP is only 6 digits, the brute force space is limited to 1 million possibilities, which can be tested rapidly without any throttling or lockout mechanisms. This flaw enables attackers to bypass authentication controls and gain unauthorized access to customer support tickets, potentially exposing sensitive customer information and support interactions. The vulnerability affects all versions up to and including 3.3.7 of the plugin. The CVSS v3.1 base score is 6.5 (medium), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and impacts on confidentiality and integrity but no availability impact. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability was publicly disclosed on September 20, 2025.
Potential Impact
For European organizations using WordPress sites with the SupportCandy plugin, this vulnerability poses a significant risk to the confidentiality and integrity of customer support data. Unauthorized access to support tickets can lead to exposure of personally identifiable information (PII), sensitive business communications, and potentially confidential customer data. This could result in regulatory non-compliance under GDPR, reputational damage, and loss of customer trust. Since the vulnerability allows unauthenticated attackers to bypass authentication without user interaction, the risk is elevated, especially for organizations relying on SupportCandy for critical customer support workflows. The impact is particularly concerning for sectors handling sensitive data such as finance, healthcare, and telecommunications. However, the lack of availability impact means service disruption is unlikely. The absence of known exploits in the wild provides a window for mitigation before active exploitation occurs.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence and version of the SupportCandy plugin. Until an official patch is released, administrators should consider disabling guest login functionality or the SupportCandy plugin entirely if feasible. Implementing web application firewall (WAF) rules to detect and block rapid repeated OTP verification attempts can help mitigate brute force attacks. Monitoring logs for unusual authentication attempts and setting up alerting for repeated OTP failures is advised. Organizations should also enforce multi-factor authentication (MFA) for administrative access to WordPress and limit access to support ticket data to authorized personnel only. Once a patch becomes available, prompt application of updates is critical. Additionally, reviewing and minimizing the exposure of sensitive data in support tickets can reduce potential damage from unauthorized access.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland
CVE-2025-10658: CWE-307 Improper Restriction of Excessive Authentication Attempts in psmplugins SupportCandy – Helpdesk & Customer Support Ticket System
Description
The SupportCandy – Helpdesk & Customer Support Ticket System plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 3.3.7. This is due to missing rate limiting on the OTP verification for guest login. This makes it possible for unauthenticated attackers to bypass authentication and gain unauthorized access to customer support tickets by brute forcing the 6-digit OTP code.
AI-Powered Analysis
Technical Analysis
CVE-2025-10658 is a medium-severity vulnerability affecting the SupportCandy – Helpdesk & Customer Support Ticket System plugin for WordPress, developed by psmplugins. The vulnerability arises from improper restriction of excessive authentication attempts (CWE-307) on the plugin's OTP (One-Time Password) verification mechanism for guest logins. Specifically, the plugin lacks rate limiting on the 6-digit OTP verification process, allowing unauthenticated attackers to perform brute force attacks against the OTP input. Since the OTP is only 6 digits, the brute force space is limited to 1 million possibilities, which can be tested rapidly without any throttling or lockout mechanisms. This flaw enables attackers to bypass authentication controls and gain unauthorized access to customer support tickets, potentially exposing sensitive customer information and support interactions. The vulnerability affects all versions up to and including 3.3.7 of the plugin. The CVSS v3.1 base score is 6.5 (medium), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and impacts on confidentiality and integrity but no availability impact. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability was publicly disclosed on September 20, 2025.
Potential Impact
For European organizations using WordPress sites with the SupportCandy plugin, this vulnerability poses a significant risk to the confidentiality and integrity of customer support data. Unauthorized access to support tickets can lead to exposure of personally identifiable information (PII), sensitive business communications, and potentially confidential customer data. This could result in regulatory non-compliance under GDPR, reputational damage, and loss of customer trust. Since the vulnerability allows unauthenticated attackers to bypass authentication without user interaction, the risk is elevated, especially for organizations relying on SupportCandy for critical customer support workflows. The impact is particularly concerning for sectors handling sensitive data such as finance, healthcare, and telecommunications. However, the lack of availability impact means service disruption is unlikely. The absence of known exploits in the wild provides a window for mitigation before active exploitation occurs.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence and version of the SupportCandy plugin. Until an official patch is released, administrators should consider disabling guest login functionality or the SupportCandy plugin entirely if feasible. Implementing web application firewall (WAF) rules to detect and block rapid repeated OTP verification attempts can help mitigate brute force attacks. Monitoring logs for unusual authentication attempts and setting up alerting for repeated OTP failures is advised. Organizations should also enforce multi-factor authentication (MFA) for administrative access to WordPress and limit access to support ticket data to authorized personnel only. Once a patch becomes available, prompt application of updates is critical. Additionally, reviewing and minimizing the exposure of sensitive data in support tickets can reduce potential damage from unauthorized access.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-17T21:59:39.750Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ce4e4eab7f779c79ff311b
Added to database: 9/20/2025, 6:48:46 AM
Last enriched: 9/28/2025, 12:47:21 AM
Last updated: 11/4/2025, 4:32:01 PM
Views: 84
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-2088: CWE-440->CWE-200 in OpenStack
MediumCVE-2025-63294: n/a
MediumTransportation Companies Hacked to Steal Cargo
MediumCVE-2025-12184: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in rboatright MeetingList
MediumCVE-2025-12682: CWE-434 Unrestricted Upload of File with Dangerous Type in fahadmahmood Easy Upload Files During Checkout
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.