CVE-2025-12023

4.3 MEDIUM

📋 TL;DR

The ELEX WordPress HelpDesk plugin has an authorization bypass vulnerability that allows authenticated users with Subscriber-level access or higher to restore tickets without proper permission checks. This affects all WordPress sites using the plugin up to version 3.3.1. Attackers can manipulate ticket statuses they shouldn't have access to.

💻 Affected Systems

Products:
  • ELEX WordPress HelpDesk & Customer Ticketing System
Versions: All versions up to and including 3.3.1
Operating Systems: All platforms running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled. Any authenticated user (Subscriber role or higher) can exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious users could restore deleted or resolved tickets, disrupting support operations, hiding evidence of previous incidents, or creating confusion in customer service workflows.

🟠

Likely Case

Low-privilege users restoring tickets they shouldn't have access to, potentially interfering with support team operations and ticket management.

🟢

If Mitigated

Minimal impact with proper user role management and monitoring, though authorization bypass still exists.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. No public exploit code identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.3.2 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3399391/elex-helpdesk-customer-support-ticket-system/trunk/includes/class-crm-ajax-functions.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'ELEX HelpDesk & Customer Support Ticket System'. 4. Click 'Update Now' if available, or download latest version from WordPress repository. 5. Activate updated plugin.

🔧 Temporary Workarounds

Temporarily disable plugin

all

Completely disable the vulnerable plugin until patched

wp plugin deactivate elex-helpdesk-customer-support-ticket-system

Restrict user roles

all

Limit Subscriber and other low-privilege user accounts

🧯 If You Can't Patch

  • Remove or restrict Subscriber-level user accounts to minimize attack surface
  • Implement additional access controls through WordPress security plugins that monitor AJAX requests

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → ELEX HelpDesk plugin version. If version is 3.3.1 or lower, system is vulnerable.

Check Version:

wp plugin get elex-helpdesk-customer-support-ticket-system --field=version

Verify Fix Applied:

Verify plugin version is 3.3.2 or higher in WordPress admin panel. Test with low-privilege user account attempting to restore tickets.

📡 Detection & Monitoring

Log Indicators:

  • Unusual ticket restoration activity from non-admin users
  • Multiple AJAX requests to eh_crm_restore_data endpoint from low-privilege accounts

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action=eh_crm_restore_data from unauthorized IPs/users

SIEM Query:

source="wordpress.log" AND "admin-ajax.php" AND "eh_crm_restore_data" AND NOT user_role="administrator"

🔗 References

📤 Share & Export