CVE-2021-24879

8.8 HIGH

📋 TL;DR

This vulnerability in the SupportCandy WordPress plugin allows attackers to perform Cross-Site Request Forgery (CSRF) attacks that can set malicious filters containing Cross-Site Scripting (XSS) payloads in logged-in users' cookies. Attackers can exploit this to execute arbitrary JavaScript in the context of authenticated users who have access to ticket lists. WordPress sites running SupportCandy plugin versions before 2.2.7 are affected.

💻 Affected Systems

Products:
  • SupportCandy WordPress Plugin
Versions: All versions before 2.2.7
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with SupportCandy plugin enabled and at least one user with ticket list access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect users to malicious sites, or install backdoors through stored XSS payloads.

🟠

Likely Case

Attackers trick authenticated users into clicking malicious links that set XSS payloads in their ticket filters, leading to session hijacking or account compromise.

🟢

If Mitigated

With proper CSRF tokens and input validation, the attack would fail as unauthorized requests would be rejected and malicious payloads would be sanitized.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick authenticated users into clicking malicious links. The vulnerability is well-documented in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.2.7

Vendor Advisory: https://wpscan.com/vulnerability/6dfb4f61-c8cb-40ad-812f-139482be0fb4

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find SupportCandy plugin. 4. Click 'Update Now' if available. 5. Alternatively, download version 2.2.7+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the SupportCandy plugin until patched to prevent exploitation.

wp plugin deactivate supportcandy

Web Application Firewall Rules

all

Implement WAF rules to block requests to wpsc_tickets AJAX endpoint without proper CSRF tokens.

🧯 If You Can't Patch

  • Restrict access to ticket lists dashboard to only essential personnel
  • Implement Content Security Policy (CSP) headers to mitigate XSS impact

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for SupportCandy version. If version is below 2.2.7, system is vulnerable.

Check Version:

wp plugin list --name=supportcandy --field=version

Verify Fix Applied:

Verify SupportCandy plugin version is 2.2.7 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with action=wpsc_tickets
  • Multiple failed CSRF validation attempts

Network Indicators:

  • HTTP requests setting unusual cookie values for ticket filters
  • Suspicious referrer headers in AJAX requests

SIEM Query:

source="wordpress.log" AND "admin-ajax.php" AND "wpsc_tickets" AND NOT "_wpnonce"

🔗 References

📤 Share & Export