CVE-2023-48324

5.4 MEDIUM

📋 TL;DR

This CVE describes a missing authorization vulnerability in the Awesome Support WordPress plugin that allows attackers to bypass access controls and potentially access restricted functionality. It affects all WordPress sites running Awesome Support versions up to and including 6.1.4.

💻 Affected Systems

Products:
  • Awesome Support WordPress Plugin
Versions: All versions up to and including 6.1.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations using the vulnerable plugin versions. The vulnerability exists in the plugin's access control implementation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive support ticket data, modify tickets, or perform administrative actions depending on what functionality lacks proper authorization checks.

🟠

Likely Case

Unauthorized users could view or modify support tickets they shouldn't have access to, potentially exposing sensitive customer information or disrupting support operations.

🟢

If Mitigated

With proper access controls and authentication mechanisms in place, only authorized users can access support ticket functionality as intended.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires understanding of the plugin's functionality and endpoints, but the vulnerability itself is straightforward once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.1.5 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/awesome-support/vulnerability/wordpress-awesome-support-helpdesk-plugin-6-1-4-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Awesome Support and click 'Update Now'. 4. Alternatively, download version 6.1.5+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the Awesome Support plugin until patched

wp plugin deactivate awesome-support

Restrict Access

linux

Use web application firewall or .htaccess to restrict access to plugin endpoints

# Add to .htaccess: RewriteRule ^wp-content/plugins/awesome-support/ - [F,L]

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the WordPress instance
  • Deploy a web application firewall with rules to detect and block unauthorized access attempts to plugin endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins → Awesome Support version

Check Version:

wp plugin get awesome-support --field=version

Verify Fix Applied:

Verify Awesome Support version is 6.1.5 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to /wp-content/plugins/awesome-support/ endpoints
  • Unauthorized users accessing support ticket functionality
  • Failed authorization attempts for plugin functions

Network Indicators:

  • HTTP requests to awesome-support endpoints from unauthorized IPs
  • Unusual API calls to plugin-specific endpoints

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-content/plugins/awesome-support/" OR plugin="awesome-support") AND (user_role!="administrator" OR user_role!="support_agent")

🔗 References

📤 Share & Export