CVE-2026-32535
Received Received - Intake
Authorization Bypass in JoomSky JS Help Desk

Publication date: 2026-03-25

Last updated on: 2026-04-29

Assigner: Patchstack

Description
Authorization Bypass Through User-Controlled Key vulnerability in JoomSky JS Help Desk js-support-ticket allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects JS Help Desk: from n/a through <= 3.0.3.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-25
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-03-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
joomsky js_help_desk to 3.0.3 (inc)
joomsky js_help_desk From 3.0.0 (inc) to 3.0.3 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The CVE-2026-32535 vulnerability allows unauthorized users to bypass authorization and authentication mechanisms, potentially granting access to sensitive files, folders, or database interactions. Such unauthorized access could lead to exposure of sensitive personal or protected data.

This kind of broken access control and unauthorized data exposure can negatively impact compliance with common standards and regulations such as GDPR and HIPAA, which require strict controls over access to personal and sensitive information.

Therefore, if exploited, this vulnerability could result in non-compliance with these regulations due to failure to adequately protect sensitive data.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

The CVE-2026-32535 vulnerability is an Insecure Direct Object References (IDOR) issue in the JS Help Desk WordPress plugin versions up to 3.0.3, allowing unauthorized access due to broken access control.

To detect this vulnerability on your system or network, you should check the installed version of the JS Help Desk plugin to see if it is version 3.0.3 or earlier, as these versions are vulnerable.

A practical detection step is to verify the plugin version via WordPress CLI or by inspecting the plugin files.

  • Use the WordPress CLI command to check the plugin version: wp plugin list | grep js-support-ticket
  • Manually check the plugin version in the plugin's main PHP file (usually found in wp-content/plugins/js-support-ticket/) by looking for the version header.

Additionally, monitoring for unauthorized access attempts or suspicious requests targeting the JS Help Desk plugin endpoints may help detect exploitation attempts, but specific commands or signatures are not provided in the available resources.

The recommended mitigation is to update the plugin to version 3.0.4 or later, which patches this vulnerability.


Can you explain this vulnerability to me?

CVE-2026-32535 is an Insecure Direct Object References (IDOR) vulnerability found in the WordPress JS Help Desk Plugin versions up to and including 3.0.3.

This vulnerability allows unauthorized users to bypass authorization and authentication mechanisms by exploiting incorrectly configured access control security levels.

As a result, attackers may gain unauthorized access to sensitive files, folders, or database interactions within the plugin.

It is classified under the OWASP Top 10 category A1: Broken Access Control and has a moderate CVSS severity score of 6.5.


How can this vulnerability impact me? :

This vulnerability can allow unauthorized users to access sensitive information or perform actions that should be restricted, due to broken access control.

Although the impact is considered low priority and unlikely to be exploited for significant harm, it can still be targeted in mass-exploit campaigns affecting many websites.

If exploited, it could lead to exposure of sensitive data or unauthorized manipulation of help desk tickets or related data.

Users of the affected plugin versions are strongly advised to update to version 3.0.4 or later to mitigate this risk.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability affects JS Help Desk Plugin versions up to and including 3.0.3 and allows unauthorized access due to broken access control.

Users are strongly advised to update the JS Help Desk Plugin to version 3.0.4 or later, where the issue has been patched.

Patchstack offers auto-update features for vulnerable plugins to facilitate rapid mitigation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart