Skip to main content

CVE-2025-10658: CWE-307 Improper Restriction of Excessive Authentication Attempts in psmplugins SupportCandy – Helpdesk & Customer Support Ticket System

Medium
VulnerabilityCVE-2025-10658cvecve-2025-10658cwe-307
Published: Sat Sep 20 2025 (09/20/2025, 06:43:18 UTC)
Source: CVE Database V5
Vendor/Project: psmplugins
Product: SupportCandy – Helpdesk & Customer Support Ticket System

Description

The SupportCandy – Helpdesk & Customer Support Ticket System plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 3.3.7. This is due to missing rate limiting on the OTP verification for guest login. This makes it possible for unauthenticated attackers to bypass authentication and gain unauthorized access to customer support tickets by brute forcing the 6-digit OTP code.

AI-Powered Analysis

AILast updated: 09/20/2025, 06:49:50 UTC

Technical Analysis

CVE-2025-10658 is a medium severity vulnerability affecting the SupportCandy – Helpdesk & Customer Support Ticket System plugin for WordPress, developed by psmplugins. The vulnerability arises from improper restriction of excessive authentication attempts (CWE-307) on the One-Time Password (OTP) verification mechanism used for guest login. Specifically, all versions up to and including 3.3.7 lack rate limiting on OTP verification, allowing unauthenticated attackers to perform brute force attacks against the 6-digit OTP code. Because the OTP is only six digits, the total possible combinations are 1,000,000, which is feasible to brute force if no rate limiting or lockout mechanisms are in place. Successful exploitation enables attackers to bypass authentication controls and gain unauthorized access to customer support tickets. This compromises confidentiality and integrity of sensitive customer data and support interactions. The vulnerability is remotely exploitable over the network without any privileges or user interaction, increasing its risk profile. Although no known exploits are currently reported in the wild, the ease of exploitation and the sensitive nature of the data accessible through the plugin make this a significant concern for organizations using SupportCandy. The CVSS v3.1 base score is 6.5 (medium), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and partial impact on confidentiality and integrity but no impact on availability. No patches or fixes have been linked yet, so affected organizations must take immediate mitigating actions to reduce risk.

Potential Impact

For European organizations using the SupportCandy plugin on WordPress sites, this vulnerability poses a direct threat to the confidentiality and integrity of customer support data. Unauthorized access to support tickets can lead to exposure of personally identifiable information (PII), sensitive business communications, and potentially credentials or other confidential information shared during support interactions. This can result in reputational damage, regulatory non-compliance (notably under GDPR), and potential financial losses. The ability to bypass authentication without user interaction or privileges means attackers can automate attacks at scale, increasing the likelihood of compromise. Organizations relying on SupportCandy for customer support risk data breaches that could affect customers across Europe, potentially triggering mandatory breach notifications and fines. Additionally, attackers gaining foothold through this vector could pivot to further attacks within the affected environment. The lack of known exploits in the wild currently provides a window for proactive defense, but the vulnerability’s characteristics suggest it could be weaponized quickly once discovered by malicious actors.

Mitigation Recommendations

1. Immediate mitigation should include implementing custom rate limiting or throttling on OTP verification endpoints at the web server or application firewall level to prevent brute force attempts. 2. Monitor logs for repeated failed OTP attempts and implement alerting for suspicious activity. 3. Temporarily disable guest login via OTP if feasible until an official patch is released. 4. Enforce multi-factor authentication (MFA) for all user roles where possible, reducing reliance on OTP for guest access. 5. Regularly update the SupportCandy plugin to the latest version once a patch addressing this vulnerability is released. 6. Conduct a thorough audit of access logs and support ticket data for signs of unauthorized access. 7. Educate support staff to recognize and report suspicious activity. 8. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block brute force patterns against OTP endpoints. 9. Engage with the vendor or community to obtain timely patches or workarounds. These steps go beyond generic advice by focusing on immediate compensating controls and proactive monitoring tailored to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-17T21:59:39.750Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ce4e4eab7f779c79ff311b

Added to database: 9/20/2025, 6:48:46 AM

Last enriched: 9/20/2025, 6:49:50 AM

Last updated: 9/21/2025, 12:09:39 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats