CVE-2024-30539
📋 TL;DR
This CVE describes a Missing Authorization vulnerability in the Awesome Support WordPress plugin that allows unauthorized users to access restricted functionality. It affects all versions up to 6.1.7, potentially exposing sensitive support ticket data to unauthenticated or low-privileged users.
💻 Affected Systems
- Awesome Support WordPress Plugin
📦 What is this software?
Awesome Support by Getawesomesupport
⚠️ Risk & Real-World Impact
Worst Case
Unauthorized users could access, modify, or delete sensitive support tickets containing customer information, PII, or internal communications, leading to data breach and compliance violations.
Likely Case
Unauthorized users accessing support tickets they shouldn't have permission to view, potentially exposing customer communications and internal support processes.
If Mitigated
With proper access controls and network segmentation, impact would be limited to unauthorized viewing of non-sensitive support data within the same network segment.
🎯 Exploit Status
Broken access control vulnerabilities typically require minimal technical skill to exploit once the vulnerability path is identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.1.8 or later
Vendor Advisory: https://wordpress.org/plugins/awesome-support/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find Awesome Support plugin
4. Click 'Update Now' if update available
5. If no update available, download version 6.1.8+ from WordPress.org
6. Deactivate old plugin
7. Upload and activate new version
🔧 Temporary Workarounds
Disable Plugin
allTemporarily disable the Awesome Support plugin until patched
wp plugin deactivate awesome-support
Restrict Access via .htaccess
linuxAdd IP-based restrictions to plugin directories
Order deny,allow
Deny from all
Allow from 192.168.1.0/24
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block unauthorized access patterns
- Enable detailed logging and monitoring for access to support ticket endpoints
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Awesome Support → Version number. If version is 6.1.7 or earlier, system is vulnerable.
Check Version:
wp plugin get awesome-support --field=version
Verify Fix Applied:
Verify plugin version is 6.1.8 or later in WordPress admin panel and test access controls with different user roles.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to /wp-content/plugins/awesome-support/ endpoints
- Access to support ticket endpoints from unauthenticated or low-privilege users
Network Indicators:
- HTTP requests to awesome-support API endpoints without proper authentication headers
SIEM Query:
source="wordpress.log" AND (uri_path="/wp-content/plugins/awesome-support/" OR user_agent="*awesome-support*") AND (http_status=200 OR http_status=302) AND (user="unauthenticated" OR user_role="subscriber")