First published: Sat Feb 10 2024(Updated: )
The Awesome Support – WordPress HelpDesk & Support Plugin plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wpas_get_users() function hooked via AJAX in all versions up to, and including, 6.1.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve user data such as emails.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Awesome Support | <6.1.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0595 is considered a medium severity vulnerability due to its potential for unauthorized access.
To fix CVE-2024-0595, update the Awesome Support plugin to version 6.1.8 or later.
CVE-2024-0595 affects all versions of the Awesome Support plugin for WordPress up to and including 6.1.7.
CVE-2024-0595 is an unauthorized access vulnerability arising from a missing capability check.
Attackers can exploit CVE-2024-0595 to gain unauthorized access to the user data through the wpas_get_users() function.