The Majestic Support – The Leading-Edge Help Desk & Customer Support Plugin plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.0.5 via the 'exportusereraserequest' function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to export ticket data for any user.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00035}

epss

{'score': 0.00039}


Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00049}

epss

{'score': 0.00035}


Tue, 18 Feb 2025 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Majesticsupport
Majesticsupport majestic Support
CPEs cpe:2.3:a:majesticsupport:majestic_support:*:*:*:*:*:wordpress:*:*
Vendors & Products Majesticsupport
Majesticsupport majestic Support

Wed, 12 Feb 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 12 Feb 2025 05:45:00 +0000

Type Values Removed Values Added
Description The Majestic Support – The Leading-Edge Help Desk & Customer Support Plugin plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.0.5 via the 'exportusereraserequest' function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to export ticket data for any user.
Title Majestic Support – The Leading-Edge Help Desk & Customer Support Plugin <= 1.0.5 - Authenticated (Subscriber+) Insecure Direct Object Reference
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-02-12T19:35:17.765Z

Reserved: 2025-01-21T18:21:50.984Z

Link: CVE-2024-13601

cve-icon Vulnrichment

Updated: 2025-02-12T19:35:09.028Z

cve-icon NVD

Status : Analyzed

Published: 2025-02-12T06:15:19.830

Modified: 2025-02-18T21:31:43.250

Link: CVE-2024-13601

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.