CVE-2022-46839
📋 TL;DR
This vulnerability allows attackers to upload arbitrary files to WordPress sites running the JS Help Desk plugin. Attackers can upload malicious files like PHP shells to gain remote code execution. All WordPress sites using JS Help Desk plugin versions up to 2.7.1 are affected.
💻 Affected Systems
- JS Help Desk – Best Help Desk & Support Plugin for WordPress
📦 What is this software?
Js Help Desk by Wiselyhub
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise leading to data theft, ransomware deployment, or website defacement via remote code execution.
Likely Case
Attackers upload web shells to establish persistent access, steal sensitive data, or use the server for malicious activities.
If Mitigated
With proper file upload restrictions and web application firewalls, impact is limited to attempted attacks being blocked.
🎯 Exploit Status
Exploitation requires no authentication and is trivial with publicly available proof-of-concept code.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.7.2 or later
Vendor Advisory: https://patchstack.com/database/vulnerability/js-support-ticket/wordpress-js-help-desk-plugin-2-7-1-arbitrary-file-upload-vulnerability
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find JS Help Desk plugin. 4. Click Update Now to version 2.7.2 or later. 5. Verify update completes successfully.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily disable the JS Help Desk plugin until patching is possible.
wp plugin deactivate js-support-ticket
Web Application Firewall Rule
allBlock file upload requests to the vulnerable plugin endpoint.
Add WAF rule to block POST requests containing file uploads to /wp-content/plugins/js-support-ticket/
🧯 If You Can't Patch
- Implement strict file upload validation at web server level
- Restrict plugin directory permissions to prevent execution of uploaded files
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > JS Help Desk plugin version. If version is 2.7.1 or earlier, you are vulnerable.
Check Version:
wp plugin get js-support-ticket --field=version
Verify Fix Applied:
After updating, verify plugin version shows 2.7.2 or later in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to /wp-content/plugins/js-support-ticket/
- POST requests with file uploads to plugin endpoints
- Execution of suspicious PHP files in upload directories
Network Indicators:
- HTTP POST requests with file uploads to vulnerable plugin paths
- Traffic to newly created suspicious files in upload directories
SIEM Query:
source="web_server_logs" AND (uri_path="/wp-content/plugins/js-support-ticket/" AND method="POST" AND file_upload="true")