CVE-2024-30539

5.3 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the Awesome Support WordPress plugin that allows unauthorized users to access restricted functionality. It affects all versions up to 6.1.7, potentially exposing sensitive support ticket data to unauthenticated or low-privileged users.

💻 Affected Systems

Products:
  • Awesome Support WordPress Plugin
Versions: n/a through 6.1.7
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with Awesome Support plugin enabled. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users could access, modify, or delete sensitive support tickets containing customer information, PII, or internal communications, leading to data breach and compliance violations.

🟠

Likely Case

Unauthorized users accessing support tickets they shouldn't have permission to view, potentially exposing customer communications and internal support processes.

🟢

If Mitigated

With proper access controls and network segmentation, impact would be limited to unauthorized viewing of non-sensitive support data within the same network segment.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Broken access control vulnerabilities typically require minimal technical skill to exploit once the vulnerability path is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.1.8 or later

Vendor Advisory: https://wordpress.org/plugins/awesome-support/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find Awesome Support plugin
4. Click 'Update Now' if update available
5. If no update available, download version 6.1.8+ from WordPress.org
6. Deactivate old plugin
7. Upload and activate new version

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the Awesome Support plugin until patched

wp plugin deactivate awesome-support

Restrict Access via .htaccess

linux

Add IP-based restrictions to plugin directories

Order deny,allow
Deny from all
Allow from 192.168.1.0/24

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block unauthorized access patterns
  • Enable detailed logging and monitoring for access to support ticket endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Awesome Support → Version number. If version is 6.1.7 or earlier, system is vulnerable.

Check Version:

wp plugin get awesome-support --field=version

Verify Fix Applied:

Verify plugin version is 6.1.8 or later in WordPress admin panel and test access controls with different user roles.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to /wp-content/plugins/awesome-support/ endpoints
  • Access to support ticket endpoints from unauthenticated or low-privilege users

Network Indicators:

  • HTTP requests to awesome-support API endpoints without proper authentication headers

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-content/plugins/awesome-support/" OR user_agent="*awesome-support*") AND (http_status=200 OR http_status=302) AND (user="unauthenticated" OR user_role="subscriber")

🔗 References

📤 Share & Export