CVE-2025-5957
BaseFortify
Publication date: 2025-07-08
Last updated on: 2025-07-08
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
This vulnerability can impact you by allowing unauthorized users to delete your support tickets, potentially causing loss of important customer support data. Since the deletion can be performed without authentication, attackers could disrupt your support operations by removing tickets arbitrarily, leading to loss of communication history, unresolved issues, and overall degradation of your customer support service. [1]
Can you explain this vulnerability to me?
The vulnerability in the Guest Support WordPress plugin (up to version 1.2.2) is due to a missing permission check on the 'deleteMassTickets' function. This flaw allows unauthenticated attackers to delete arbitrary support tickets without proper authorization. Essentially, anyone could delete multiple support tickets because the plugin did not verify if the user had the right permissions to perform this action. The issue was fixed in version 1.2.3 by adding a permission check that restricts mass ticket deletion to administrators or agents explicitly allowed to delete tickets. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
To detect this vulnerability on your system, you can check the version of the Guest Support WordPress plugin installed. Versions up to and including 1.2.2 are vulnerable. You can verify the plugin version via the WordPress admin dashboard or by checking the plugin files directly. Additionally, monitoring for unauthorized deletion of support tickets or unexpected mass deletion actions in logs may indicate exploitation attempts. Since the vulnerability involves unauthorized AJAX requests to the 'deleteMassTickets' function, you can inspect web server logs for POST requests to the plugin's AJAX handler (e.g., includes/library/ajax.php) with the 'request=delete_tickets' parameter. Example command to search web server logs for such requests (assuming Apache logs): ```bash grep 'request=delete_tickets' /var/log/apache2/access.log ``` Or for Nginx: ```bash grep 'request=delete_tickets' /var/log/nginx/access.log ``` Also, you can check the plugin version via command line by inspecting the plugin's main file header or using WP-CLI: ```bash wp plugin get guest-support --field=version ``` If the version is 1.2.2 or below, the plugin is vulnerable. No direct commands to detect the exploit beyond version checking and log inspection are provided in the resources. [1, 2]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to update the Guest Support WordPress plugin to version 1.2.3 or later, which includes a critical security fix adding proper permission checks to the mass ticket deletion functionality. This update ensures that only administrators or agents with explicit 'can_delete_tickets' permission can delete tickets, preventing unauthorized deletions. If updating immediately is not possible, restrict access to the plugin's AJAX endpoints and monitor for suspicious activity. Additionally, review user roles and permissions to ensure no unauthorized users have deletion capabilities. Summary of mitigation: - Update Guest Support plugin to version 1.2.3 or later. - Verify and restrict user permissions related to ticket deletion. - Monitor logs for unauthorized deletion attempts. These steps are based on the fix described in Resource 1. [1]