CVE-2022-46839

10.0 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload arbitrary files to WordPress sites running the JS Help Desk plugin. Attackers can upload malicious files like PHP shells to gain remote code execution. All WordPress sites using JS Help Desk plugin versions up to 2.7.1 are affected.

💻 Affected Systems

Products:
  • JS Help Desk – Best Help Desk & Support Plugin for WordPress
Versions: n/a through 2.7.1
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with vulnerable plugin versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data theft, ransomware deployment, or website defacement via remote code execution.

🟠

Likely Case

Attackers upload web shells to establish persistent access, steal sensitive data, or use the server for malicious activities.

🟢

If Mitigated

With proper file upload restrictions and web application firewalls, impact is limited to attempted attacks being blocked.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and is trivial with publicly available proof-of-concept code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.7.2 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/js-support-ticket/wordpress-js-help-desk-plugin-2-7-1-arbitrary-file-upload-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find JS Help Desk plugin. 4. Click Update Now to version 2.7.2 or later. 5. Verify update completes successfully.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the JS Help Desk plugin until patching is possible.

wp plugin deactivate js-support-ticket

Web Application Firewall Rule

all

Block file upload requests to the vulnerable plugin endpoint.

Add WAF rule to block POST requests containing file uploads to /wp-content/plugins/js-support-ticket/

🧯 If You Can't Patch

  • Implement strict file upload validation at web server level
  • Restrict plugin directory permissions to prevent execution of uploaded files

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > JS Help Desk plugin version. If version is 2.7.1 or earlier, you are vulnerable.

Check Version:

wp plugin get js-support-ticket --field=version

Verify Fix Applied:

After updating, verify plugin version shows 2.7.2 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to /wp-content/plugins/js-support-ticket/
  • POST requests with file uploads to plugin endpoints
  • Execution of suspicious PHP files in upload directories

Network Indicators:

  • HTTP POST requests with file uploads to vulnerable plugin paths
  • Traffic to newly created suspicious files in upload directories

SIEM Query:

source="web_server_logs" AND (uri_path="/wp-content/plugins/js-support-ticket/" AND method="POST" AND file_upload="true")

🔗 References

📤 Share & Export