CVE-2025-10039

4.3 MEDIUM

📋 TL;DR

The ELEX WordPress HelpDesk plugin has an Insecure Direct Object Reference vulnerability that allows authenticated users with Subscriber-level access or higher to read all support tickets. This affects all versions up to and including 3.2.9. Attackers can exploit this to access sensitive customer support information.

💻 Affected Systems

Products:
  • ELEX WordPress HelpDesk & Customer Ticketing System
Versions: All versions up to and including 3.2.9
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled. Any authenticated user (Subscriber role or higher) can exploit this vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

All customer support tickets containing sensitive information (personal data, payment details, account credentials) are exposed to any authenticated user, leading to data breach and regulatory violations.

🟠

Likely Case

Malicious subscribers or compromised accounts access confidential support tickets containing personal information, leading to privacy violations and potential credential harvesting.

🟢

If Mitigated

Limited exposure if proper access controls and monitoring are in place, with only authorized support staff having access to sensitive ticket data.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward via the vulnerable 'eh_crm_ticket_single_view_client' function. Technical details are publicly available in the references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.3.0

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3391342/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'ELEX HelpDesk & Customer Support Ticket System'. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 3.3.0+ from WordPress plugin repository and manually update.

🔧 Temporary Workarounds

Disable vulnerable function

all

Temporarily disable the vulnerable 'eh_crm_ticket_single_view_client' function by modifying the plugin code

Edit includes/class-crm-ajax-functions.php and comment out or remove the vulnerable function (around line 259)

Restrict user roles

all

Temporarily restrict Subscriber and other non-essential roles from accessing the helpdesk system

Use WordPress role management plugins to modify capabilities

🧯 If You Can't Patch

  • Implement strict access controls and monitoring for all authenticated users
  • Disable the ELEX HelpDesk plugin entirely until patching is possible

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > ELEX HelpDesk version. If version is 3.2.9 or lower, you are vulnerable.

Check Version:

wp plugin list --name='ELEX HelpDesk & Customer Support Ticket System' --field=version

Verify Fix Applied:

Verify plugin version is 3.3.0 or higher in WordPress admin panel. Test with authenticated user accounts to confirm ticket access is properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to ticket viewing endpoints by non-support staff users
  • Multiple ticket ID enumeration attempts from single user accounts

Network Indicators:

  • HTTP requests to /wp-admin/admin-ajax.php with action=eh_crm_ticket_single_view_client containing unusual ticket IDs

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php") AND (query_string="action=eh_crm_ticket_single_view_client") AND (user_role="subscriber" OR user_role="contributor")

🔗 References

📤 Share & Export