First published: Tue Apr 01 2025(Updated: )
The Awesome Support – WordPress HelpDesk & Support Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 6.3.1 via the 'awesome-support' directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads/awesome-support directory which can contain file attachments included in support tickets. The vulnerability was partially patched in version 6.3.1.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Awesome Support | <=6.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13567 is classified as a critical vulnerability due to its potential for sensitive information exposure.
To mitigate CVE-2024-13567, upgrade the Awesome Support – WordPress HelpDesk & Support Plugin to version 6.3.2 or later.
All users of the Awesome Support – WordPress HelpDesk & Support Plugin up to and including version 6.3.1 are affected by CVE-2024-13567.
CVE-2024-13567 is a Sensitive Information Exposure vulnerability that allows unauthorized access to sensitive data.
Yes, unauthenticated attackers can exploit CVE-2024-13567 to extract sensitive information.