CVE-2025-13534

6.3 MEDIUM

📋 TL;DR

The ELEX WordPress HelpDesk plugin has a privilege escalation vulnerability that allows authenticated users with Contributor-level access or higher to elevate their permissions to full helpdesk administrator. This enables unauthorized access to ticket management, settings configuration, and sensitive customer data. All WordPress sites using this plugin up to version 3.3.2 are affected.

💻 Affected Systems

Products:
  • ELEX WordPress HelpDesk & Customer Ticketing System
Versions: All versions up to and including 3.3.2
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with the vulnerable plugin installed and at least one authenticated user with Contributor role or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control over the helpdesk system, allowing them to view all customer tickets, modify settings, manage agents, and potentially access sensitive customer data including personal information and support communications.

🟠

Likely Case

Malicious contributors or authors escalate their privileges to access and manipulate helpdesk tickets, potentially viewing sensitive customer information or disrupting support operations.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to unauthorized helpdesk access without broader WordPress admin compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. The vulnerability is in an AJAX endpoint with missing authorization checks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 3.3.2

Vendor Advisory: https://plugins.trac.wordpress.org/browser/elex-helpdesk-customer-support-ticket-system

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'ELEX HelpDesk & Customer Support Ticket System'. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and remove the plugin until patched version is released.

🔧 Temporary Workarounds

Disable vulnerable AJAX endpoint

all

Remove or restrict access to the vulnerable eh_crm_edit_agent AJAX action

Add to theme's functions.php or custom plugin: add_action('init', function() { remove_action('wp_ajax_eh_crm_edit_agent', 'eh_crm_edit_agent_callback'); });

Restrict user roles

all

Temporarily remove Contributor and Author roles from users who don't need them

Use WordPress user management or plugins like User Role Editor to restrict permissions

🧯 If You Can't Patch

  • Deactivate the ELEX HelpDesk plugin immediately and use alternative support solutions
  • Implement strict access controls and monitor all authenticated user activity, especially AJAX requests to helpdesk endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for 'ELEX HelpDesk & Customer Support Ticket System' version 3.3.2 or lower

Check Version:

wp plugin list --name='elex-helpdesk-customer-support-ticket-system' --field=version

Verify Fix Applied:

Verify plugin version is higher than 3.3.2 in WordPress admin plugins page

📡 Detection & Monitoring

Log Indicators:

  • Unusual AJAX requests to /wp-admin/admin-ajax.php with action=eh_crm_edit_agent from non-admin users
  • User role changes in helpdesk system from Contributor/Author to Administrator

Network Indicators:

  • POST requests to admin-ajax.php with eh_crm_edit_agent parameter from unexpected user accounts

SIEM Query:

source="wordpress.log" AND "admin-ajax.php" AND "eh_crm_edit_agent" AND (user_role="contributor" OR user_role="author")

🔗 References

📤 Share & Export