CVE-2025-5957
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-07-08

Last updated on: 2025-07-08

Assigner: Wordfence

Description
The Guest Support – Complete customer support ticket system for WordPress plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'deleteMassTickets' function in all versions up to, and including, 1.2.2. This makes it possible for unauthenticated attackers to delete arbitrary support tickets.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-08
Last Modified
2025-07-08
Generated
2026-05-07
AI Q&A
2025-07-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

This vulnerability can impact you by allowing unauthorized users to delete your support tickets, potentially causing loss of important customer support data. Since the deletion can be performed without authentication, attackers could disrupt your support operations by removing tickets arbitrarily, leading to loss of communication history, unresolved issues, and overall degradation of your customer support service. [1]


Can you explain this vulnerability to me?

The vulnerability in the Guest Support WordPress plugin (up to version 1.2.2) is due to a missing permission check on the 'deleteMassTickets' function. This flaw allows unauthenticated attackers to delete arbitrary support tickets without proper authorization. Essentially, anyone could delete multiple support tickets because the plugin did not verify if the user had the right permissions to perform this action. The issue was fixed in version 1.2.3 by adding a permission check that restricts mass ticket deletion to administrators or agents explicitly allowed to delete tickets. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

To detect this vulnerability on your system, you can check the version of the Guest Support WordPress plugin installed. Versions up to and including 1.2.2 are vulnerable. You can verify the plugin version via the WordPress admin dashboard or by checking the plugin files directly. Additionally, monitoring for unauthorized deletion of support tickets or unexpected mass deletion actions in logs may indicate exploitation attempts. Since the vulnerability involves unauthorized AJAX requests to the 'deleteMassTickets' function, you can inspect web server logs for POST requests to the plugin's AJAX handler (e.g., includes/library/ajax.php) with the 'request=delete_tickets' parameter. Example command to search web server logs for such requests (assuming Apache logs): ```bash grep 'request=delete_tickets' /var/log/apache2/access.log ``` Or for Nginx: ```bash grep 'request=delete_tickets' /var/log/nginx/access.log ``` Also, you can check the plugin version via command line by inspecting the plugin's main file header or using WP-CLI: ```bash wp plugin get guest-support --field=version ``` If the version is 1.2.2 or below, the plugin is vulnerable. No direct commands to detect the exploit beyond version checking and log inspection are provided in the resources. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to update the Guest Support WordPress plugin to version 1.2.3 or later, which includes a critical security fix adding proper permission checks to the mass ticket deletion functionality. This update ensures that only administrators or agents with explicit 'can_delete_tickets' permission can delete tickets, preventing unauthorized deletions. If updating immediately is not possible, restrict access to the plugin's AJAX endpoints and monitor for suspicious activity. Additionally, review user roles and permissions to ensure no unauthorized users have deletion capabilities. Summary of mitigation: - Update Guest Support plugin to version 1.2.3 or later. - Verify and restrict user permissions related to ticket deletion. - Monitor logs for unauthorized deletion attempts. These steps are based on the fix described in Resource 1. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart