Description
The ELEX WordPress HelpDesk & Customer Ticketing System plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the eh_crm_restore_data() function in all versions up to, and including, 3.3.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to restore tickets.
Published: 2025-11-21
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized modification of customer tickets via missing authorization check
Action: Apply Patch
AI Analysis

Impact

The ELEX WordPress HelpDesk & Customer Ticketing System plugin allows authenticated users with Subscriber level or higher to invoke the eh_crm_restore_data() function without performing a capability check. By exploiting this missing authorization, an attacker can restore tickets to a prior state or revert changes, effectively tampering with ticket data. The primary impact is the ability to modify or roll back support tickets, which can compromise data integrity and potentially leak sensitive information. This flaw aligns with CWE‑862, missing authorization. The CVSS base score of 4.3 places it in the moderate range, indicating that while the vulnerability is exploitable, it does not enable arbitrary code execution or privilege escalation beyond the existing user role.

Affected Systems

All installations of the ELEX WordPress HelpDesk & Customer Ticketing System plugin with version 3.3.1 or earlier are affected. The plugin is distributed as a WordPress add‑on by the vendor EleExtensions. Users of the free WordPress version of the plugin are at risk if they have not upgraded past version 3.3.1.

Risk and Exploitability

The exploit requires authenticated access, so an attacker must first obtain a valid WordPress account with Subscriber or higher privileges. The EPSS score of less than 1% indicates a very low probability of real‑world exploitation, and the vulnerability is not listed in the CISA KEV catalog. However, the moderate CVSS rating means that once authenticated, the attacker can modify support ticket content, potentially leading to data tampering, loss of trust, and operational disruption. The lack of a remote exploit path and the need for legitimate account credentials further reduce immediate danger, but the flaw still permits a malicious user within the system to manipulate ticket history.

Generated by OpenCVE AI on April 22, 2026 at 12:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the ELEX WordPress HelpDesk & Customer Ticketing System plugin to a version newer than 3.3.1, which includes the missing authorization check for ticket restores.
  • If an upgrade is not immediately possible, restrict the execution of the eh_crm_restore_data() function to administrators by adding a capability check or disabling the restore feature for all other user roles.
  • Disable or restrict the ability for Subscriber or lower roles to view or edit tickets through an additional WordPress permissions plugin and monitor logs for unauthorized restore attempts.

Generated by OpenCVE AI on April 22, 2026 at 12:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 03 Dec 2025 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Elula
Elula wsdesk
CPEs cpe:2.3:a:elula:wsdesk:*:*:*:*:free:wordpress:*:*
Vendors & Products Elula
Elula wsdesk

Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Elextensions
Elextensions elex Wordpress Plugin
Wordpress
Wordpress wordpress
Vendors & Products Elextensions
Elextensions elex Wordpress Plugin
Wordpress
Wordpress wordpress

Fri, 21 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 21 Nov 2025 05:45:00 +0000

Type Values Removed Values Added
Description The ELEX WordPress HelpDesk & Customer Ticketing System plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the eh_crm_restore_data() function in all versions up to, and including, 3.3.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to restore tickets.
Title ELEX WordPress HelpDesk & Customer Ticketing System <= 3.3.1 - Missing Authorization to Authenticated (Subscriber+) Ticket Restore
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Elextensions Elex Wordpress Plugin
Elula Wsdesk
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:49:36.139Z

Reserved: 2025-10-21T14:46:47.792Z

Link: CVE-2025-12023

cve-icon Vulnrichment

Updated: 2025-11-21T14:54:06.699Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-21T06:15:47.720

Modified: 2025-12-03T18:28:40.577

Link: CVE-2025-12023

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T12:30:16Z

Weaknesses