The JS Help Desk – The Ultimate Help Desk & Support Plugin plugin for WordPress is vulnerable to PHP Code Injection leading to Remote Code Execution in all versions up to, and including, 2.8.6 via the 'storeTheme' function. This is due to a lack of sanitization on user-supplied values, which replace values in the style.php file, along with missing capability checks. This makes it possible for unauthenticated attackers to execute code on the server. This issue was partially patched in 2.8.6 when the code injection issue was resolved, and fully patched in 2.8.7 when the missing authorization and cross-site request forgery protection was added.
Metrics
Affected Vendors & Products
References
History
Tue, 13 Aug 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wiselyhub
Wiselyhub js Help Desk |
|
CPEs | cpe:2.3:a:wiselyhub:js_help_desk:*:*:*:*:*:*:*:* | |
Vendors & Products |
Wiselyhub
Wiselyhub js Help Desk |
|
Metrics |
ssvc
|
Tue, 13 Aug 2024 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The JS Help Desk – The Ultimate Help Desk & Support Plugin plugin for WordPress is vulnerable to PHP Code Injection leading to Remote Code Execution in all versions up to, and including, 2.8.6 via the 'storeTheme' function. This is due to a lack of sanitization on user-supplied values, which replace values in the style.php file, along with missing capability checks. This makes it possible for unauthenticated attackers to execute code on the server. This issue was partially patched in 2.8.6 when the code injection issue was resolved, and fully patched in 2.8.7 when the missing authorization and cross-site request forgery protection was added. | |
Title | JS Help Desk – The Ultimate Help Desk & Support Plugin <= 2.8.6 - Unauthenticated PHP Code Injection to Remote Code Execution | |
Weaknesses | CWE-94 | |
References |
|
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-08-13T02:31:39.099Z
Updated: 2024-08-13T14:51:27.755Z
Reserved: 2024-07-24T21:58:26.836Z
Link: CVE-2024-7094
Vulnrichment
Updated: 2024-08-13T14:51:18.768Z
NVD
Status : Awaiting Analysis
Published: 2024-08-13T03:15:04.400
Modified: 2024-08-13T12:58:25.437
Link: CVE-2024-7094
Redhat
No data.