The KB Support – WordPress Help Desk and Knowledge Base plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on the 'kbs_ajax_load_front_end_replies' and 'kbs_ajax_mark_reply_as_read' functions in all versions up to, and including, 1.6.6. This makes it possible for unauthenticated attackers to read replies of any ticket, and mark any reply as read.
Metrics
Affected Vendors & Products
References
History
Mon, 10 Feb 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Logon
Logon kb Support |
|
CPEs | cpe:2.3:a:logon:kb_support:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Logon
Logon kb Support |
Tue, 01 Oct 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cagdasdag
Cagdasdag kb Support Wordpress Help Desk And Knowledge Base |
|
CPEs | cpe:2.3:a:cagdasdag:kb_support_wordpress_help_desk_and_knowledge_base:*:*:*:*:*:*:*:* | |
Vendors & Products |
Cagdasdag
Cagdasdag kb Support Wordpress Help Desk And Knowledge Base |
|
Metrics |
ssvc
|
Tue, 01 Oct 2024 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The KB Support – WordPress Help Desk and Knowledge Base plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on the 'kbs_ajax_load_front_end_replies' and 'kbs_ajax_mark_reply_as_read' functions in all versions up to, and including, 1.6.6. This makes it possible for unauthenticated attackers to read replies of any ticket, and mark any reply as read. | |
Title | KB Support – WordPress Help Desk and Knowledge Base <= 1.6.6 - Missing Authorization to Unauthenticated Ticket Reply Exposure | |
Weaknesses | CWE-862 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-10-01T13:44:02.056Z
Reserved: 2024-09-09T21:44:55.977Z
Link: CVE-2024-8632

Updated: 2024-10-01T13:43:56.346Z

Status : Analyzed
Published: 2024-10-01T08:15:03.610
Modified: 2025-02-10T16:00:58.347
Link: CVE-2024-8632

No data.