Impact
The Awesome Support plugin contains an insecure direct object reference that allows an authenticated WordPress user with subscriber role or higher to bypass authorization checks when requesting ticket replies via the wpas_get_ticket_replies_ajax() function. By manipulating the ticket_id parameter, the attacker can view reply content from any support ticket, thereby compromising the confidentiality of ticket information within the system. This flaw corresponds to CWE-639, which describes an authorization bypass enabling unauthorized data access.
Affected Systems
WordPress sites running the Awesome Support – WordPress HelpDesk & Support Plugin, version 6.3.7 or earlier, are affected. Any installation that grants subscriber or higher privileges to users is potentially vulnerable.
Risk and Exploitability
The CVSS base score of 5.3 indicates a moderate risk level. The vulnerability requires the attacker to be authenticated, limiting the attack surface to users with subscriber-level access. No publicly disclosed exploit code exists, and the issue is not listed in the CISA KEV catalog, suggesting that exploitation is unlikely but remains a concern for sites with many authenticated users.
OpenCVE Enrichment