Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in JoomSky JS Help Desk js-support-ticket allows Path Traversal.This issue affects JS Help Desk: from n/a through <= 2.9.1.
Published: 2025-04-01
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an improper limitation of a pathname to a restricted directory (Path Traversal) that allows an attacker to download arbitrary files from the server via the JoomSky JS Help Desk plugin. An attacker can supply a crafted request that bypasses the intended directory restrictions, leading to disclosure of sensitive files such as configuration files, user data, or backup archives. The flaw is a classic Path Traversal weakness (CWE‑22) and does not require authentication, giving it a high potential impact on confidentiality by leaking content.

Affected Systems

The flaw affects the WordPress plugin JoomSky JS Help Desk (js-support-ticket) in all released versions up to and including 2.9.1. Systems running a WordPress site with this plugin installed and without an updated version are vulnerable. No specific product name other than the plugin is listed, but the issue resides within the WordPress ecosystem.

Risk and Exploitability

The CVSS score of 7.5 indicates high severity, and the EPSS score of less than 1% suggests that exploit attempts are currently rare, though the vulnerability remains a valid attack vector. It is not listed in the CISA KEV catalog. Based on the description, an attacker could exploit this by accessing the plugin’s file download endpoint from a remote web page, using directory traversal characters to reach files outside the allowed base directory. It is inferred that no special privileges or complex prerequisites are required, making it a straightforward exploitation path for attackers.

Generated by OpenCVE AI on May 2, 2026 at 02:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the JoomSky JS Help Desk plugin to the latest available version, which removes the Path Traversal flaw.
  • If an update is not immediately possible, configure your web server (e.g., via .htaccess or Nginx) to restrict the /js-support-ticket/download/ endpoint to authenticated admin users only, or completely block access.
  • Remove or disable the js-support-ticket plugin from the WordPress installation if the business does not require it.

Generated by OpenCVE AI on May 2, 2026 at 02:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-9084 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in JoomSky JS Help Desk allows Path Traversal. This issue affects JS Help Desk: from n/a through 2.9.1.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in JoomSky JS Help Desk allows Path Traversal. This issue affects JS Help Desk: from n/a through 2.9.1. Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in JoomSky JS Help Desk js-support-ticket allows Path Traversal.This issue affects JS Help Desk: from n/a through <= 2.9.1.
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Fri, 23 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:joomsky:js_help_desk:*:*:*:*:*:wordpress:*:*

Tue, 01 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 01 Apr 2025 05:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in JoomSky JS Help Desk allows Path Traversal. This issue affects JS Help Desk: from n/a through 2.9.1.
Title WordPress JS Help Desk plugin <= 2.9.1 - Arbitrary File Download vulnerability
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Joomsky Js Help Desk
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:59.519Z

Reserved: 2025-03-26T09:21:15.800Z

Link: CVE-2025-30882

cve-icon Vulnrichment

Updated: 2025-04-01T15:51:07.631Z

cve-icon NVD

Status : Modified

Published: 2025-04-01T06:15:54.070

Modified: 2026-04-23T15:27:15.390

Link: CVE-2025-30882

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T03:00:13Z

Weaknesses