Vulnerabilities > Supportcandy > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-06-19 | CVE-2023-2719 | Unspecified vulnerability in Supportcandy The SupportCandy WordPress plugin before 3.1.7 does not properly sanitise and escape the `id` parameter for an Agent in the REST API before using it in an SQL statement, leading to an SQL Injection exploitable by users with a role as low as Subscriber. | 8.8 |
2023-06-19 | CVE-2023-2805 | Unspecified vulnerability in Supportcandy The SupportCandy WordPress plugin before 3.1.7 does not properly sanitise and escape the agents[] parameter in the set_add_agent_leaves AJAX function before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin. | 7.2 |
2022-02-07 | CVE-2021-24839 | Missing Authorization vulnerability in Supportcandy The SupportCandy WordPress plugin before 2.2.5 does not have authorisation and CSRF checks in its wpsc_tickets AJAX action, which could allow unauthenticated users to call it and delete arbitrary tickets via the set_delete_permanently_bulk_ticket setting_action. | 7.5 |
2022-02-07 | CVE-2021-24879 | Cross-Site Request Forgery (CSRF) vulnerability in Supportcandy The SupportCandy WordPress plugin before 2.2.7 does not have CSRF check in the wpsc_tickets AJAX action, nor has any sanitisation or escaping in some of the filter fields which could allow attackers to make a logged in user having access to the ticket lists dashboard set an arbitrary filter (stored in their cookies) with an XSS payload in it. | 8.8 |