Description
The SupportCandy – Helpdesk & Customer Support Ticket System plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.4.4 via the 'add_reply' function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with subscriber-level access and above, to steal file attachments uploaded by other users by specifying arbitrary attachment IDs in the 'description_attachments' parameter, re-associating those files to their own tickets and removing access from the original owners.
Published: 2026-01-31
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unrestricted access to file attachments via insecure direct object reference
Action: Apply Patch
AI Analysis

Impact

The SupportCandy Helpdesk & Customer Support Ticket System plugin for WordPress is vulnerable to an insecure direct object reference, a CWE‑639 flaw. The defect exists in the add_reply function where the description_attachments parameter is not validated against a user‑controlled key. An authenticated user with subscriber-level privileges or higher can supply arbitrary attachment IDs, causing the system to re‑associate those files with the attacker’s tickets and revoke the original owners’ access. This results in unauthorized disclosure or removal of user‑uploaded documents, compromising confidentiality and potentially availability of attachments.

Affected Systems

All installations of the SupportCandy WordPress plugin with a version of 3.4.4 or earlier are affected. The vulnerability is present in every supported build of that version range and is not limited to a single configuration or deployment scenario.

Risk and Exploitability

The CVSS score of 5.4 classifies the issue as moderate severity, but the EPSS score of less than 1% indicates a low exploitation probability at present. The vulnerability is not listed in the CISA KEV catalog, suggesting it has not yet been leveraged by large‑scale attackers. Exploitation requires authenticated access to the WordPress site with at least subscriber privileges, so the potential impact is confined to users who already have login capabilities. Nonetheless, the ability to steal and reallocate sensitive attachments warrants timely remediation.

Generated by OpenCVE AI on April 16, 2026 at 01:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the SupportCandy plugin to the latest available version.
  • Remove any tickets that were created by attackers and contain stolen attachments to deny further unauthorized access.
  • Enforce strict server‑side validation of attachment identifiers so that only the original uploader can associate a file with a ticket.

Generated by OpenCVE AI on April 16, 2026 at 01:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 03 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Psmplugins
Psmplugins supportcandy – Helpdesk & Customer Support Ticket System
Wordpress
Wordpress wordpress
Vendors & Products Psmplugins
Psmplugins supportcandy – Helpdesk & Customer Support Ticket System
Wordpress
Wordpress wordpress

Mon, 02 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 31 Jan 2026 07:00:00 +0000

Type Values Removed Values Added
Description The SupportCandy – Helpdesk & Customer Support Ticket System plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.4.4 via the 'add_reply' function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with subscriber-level access and above, to steal file attachments uploaded by other users by specifying arbitrary attachment IDs in the 'description_attachments' parameter, re-associating those files to their own tickets and removing access from the original owners.
Title SupportCandy – Helpdesk & Customer Support Ticket System <= 3.4.4 - Authenticated (Subscriber+) Insecure Direct Object Reference
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


Subscriptions

Psmplugins Supportcandy – Helpdesk & Customer Support Ticket System
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:05:35.339Z

Reserved: 2026-01-20T19:04:14.485Z

Link: CVE-2026-1251

cve-icon Vulnrichment

Updated: 2026-02-02T17:55:53.658Z

cve-icon NVD

Status : Deferred

Published: 2026-01-31T07:16:02.273

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1251

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T01:30:20Z

Weaknesses