Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in JoomSky JS Help Desk js-support-ticket allows PHP Local File Inclusion.This issue affects JS Help Desk: from n/a through <= 2.9.2.
Published: 2025-04-01
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an Improper Control of Filename for Include/Require Statement that allows an attacker to exploit a PHP Local File Inclusion in the JoomSky JS Help Desk plugin. This flaw could let a malicious user include arbitrary local files, potentially exposing sensitive data or executing code, depending on server configuration. The weakness is classified as CWE‑98.

Affected Systems

Affected product: the WordPress plugin JoomSky JS Help Desk (js-support-ticket) for versions from the earliest available up to and including 2.9.2. The plugin runs on WordPress sites and contains PHP code that processes user‑supplied paths for include/require operations without proper validation.

Risk and Exploitability

The CVSS score of 8.1 indicates a high severity. EPSS score is less than 1%, suggesting a low current exploitation probability. The vulnerability is not listed in CISA KEV. Exploitation would likely require the attacker to craft a request that passes a malicious file path to the plugin; the plugin would then include that file, possibly exposing sensitive content or enabling code execution. The attack vector is inferred to be through the plugin’s input handling within the WordPress environment.

Generated by OpenCVE AI on May 1, 2026 at 12:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the JoomSky JS Help Desk plugin to the latest stable version that contains the file‑inclusion fix.
  • If an upgrade is not feasible, completely uninstall or disable the plugin and remove any references to its include/require functionality from the WordPress installation.
  • Configure your web application firewall or server access rules to block requests containing directory traversal patterns (e.g., ".." or absolute paths) directed at the plugin’s endpoints, and ensure that file permissions on the web root restrict read access to only necessary files.

Generated by OpenCVE AI on May 1, 2026 at 12:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-9076 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in JoomSky JS Help Desk allows PHP Local File Inclusion. This issue affects JS Help Desk: from n/a through 2.9.2.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in JoomSky JS Help Desk allows PHP Local File Inclusion. This issue affects JS Help Desk: from n/a through 2.9.2. Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in JoomSky JS Help Desk js-support-ticket allows PHP Local File Inclusion.This issue affects JS Help Desk: from n/a through <= 2.9.2.
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Fri, 23 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:joomsky:js_help_desk:*:*:*:*:*:wordpress:*:*

Tue, 01 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 01 Apr 2025 05:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in JoomSky JS Help Desk allows PHP Local File Inclusion. This issue affects JS Help Desk: from n/a through 2.9.2.
Title WordPress JS Help Desk plugin <= 2.9.2 - Local File Inclusion vulnerability
Weaknesses CWE-98
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Joomsky Js Help Desk
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:59.989Z

Reserved: 2025-03-26T09:21:31.391Z

Link: CVE-2025-30901

cve-icon Vulnrichment

Updated: 2025-04-01T15:50:17.986Z

cve-icon NVD

Status : Modified

Published: 2025-04-01T06:15:54.400

Modified: 2026-04-23T15:27:17.520

Link: CVE-2025-30901

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T12:15:17Z

Weaknesses