Description
Missing Authorization vulnerability in PSM Plugins SupportCandy supportcandy allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SupportCandy: from n/a through <= 3.4.4.
Published: 2026-02-19
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access
Action: Patch
AI Analysis

Impact

The vulnerability resides in the Authorization logic of the SupportCandy plugin for WordPress. An attacker can exploit incorrect access control settings to obtain privileges that the plugin should restrict, enabling them to view, edit, or delete support tickets and other sensitive data. The weakness is classified as CWE‑862, indicating a failure to enforce proper access restrictions.

Affected Systems

The affected product is the WordPress plugin SupportCandy by PSM Plugins, version 3.4.4 and all earlier releases. The issue applies to any site running the plugin in these versions, regardless of other site configuration.

Risk and Exploitability

The security scoring of 5.3 indicates medium severity for the plugin. The exploitation probability value of less than 1% shows a low likelihood of use in the wild, and this issue is not documented in the CISA KEV catalog. The attack vector is not explicitly defined in the description; however, the missing authorization suggests that any authenticated user with plugin access could exploit the flaw to elevate privileges, or an unauthenticated visitor might manipulate the plugin’s interface if it exposes endpoints without proper checks. Given the moderate severity and low likelihood of exploitation, the overall risk to a site is moderate, but the potential confidentiality impact warrants timely remediation.

Generated by OpenCVE AI on April 16, 2026 at 06:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the SupportCandy plugin to the latest version (currently 3.4.5 or newer) to remove the broken access control flaw.
  • Verify that only appropriate roles (e.g., administrators or support staff) have permissions to access the support ticket functions within the plugin settings.
  • If an upgrade is not immediately possible, disable the plugin or move the site into maintenance mode until the patch can be applied.

Generated by OpenCVE AI on April 16, 2026 at 06:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Psm Plugins
Psm Plugins supportcandy
Wordpress
Wordpress wordpress
Vendors & Products Psm Plugins
Psm Plugins supportcandy
Wordpress
Wordpress wordpress

Fri, 20 Feb 2026 01:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 22:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Thu, 19 Feb 2026 08:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in PSM Plugins SupportCandy supportcandy allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SupportCandy: from n/a through <= 3.4.4.
Title WordPress SupportCandy plugin <= 3.4.4 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Psm Plugins Supportcandy
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:14:46.106Z

Reserved: 2026-02-02T12:20:47.811Z

Link: CVE-2026-25321

cve-icon Vulnrichment

Updated: 2026-02-19T21:30:09.044Z

cve-icon NVD

Status : Deferred

Published: 2026-02-19T09:16:16.483

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-25321

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T06:45:16Z

Weaknesses