Impact
The vulnerability resides in the JS Help Desk plugin for WordPress, where the 'storeTickets()' function uses a 'multiformid' parameter directly in an SQL query. Because the supplied value is passed to the esc_sql() routine without enclosing it in quotes, escaping does not protect against payloads lacking quote characters. An attacker who can submit data to this endpoint can inject arbitrary SQL, enabling extraction of sensitive database contents. This is a classic SQL Injection (CWE-89) that compromises data confidentiality.
Affected Systems
All released iterations of the JS Help Desk – AI‑Powered Support & Ticketing System plugin are vulnerable through version 3.0.4 inclusive. The affected product is distributed by rabilal. No higher versions are indicated as impacted, but any instance running the plugin before the 3.0.4 update is at risk.
Risk and Exploitability
The CVSS base score of 7.5 reflects a medium‑to‑high severity level. The EPSS score is not documented, and the vulnerability is not currently listed in the CISA Known Exploited Vulnerabilities catalog. Because the flaw is exploitable by unauthenticated users who can reach the ticket‑submission interface, the risk is heightened for publicly exposed WordPress sites. Attackers could send malicious payloads in the 'multiformid' field, bypassing basic sanitization and potentially retrieving or manipulating database data.
OpenCVE Enrichment