Supportcandy

Supportcandy

10 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.17%
  • Veröffentlicht 11.04.2024 01:25:07
  • Zuletzt bearbeitet 21.11.2024 09:05:34

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SupportCandy allows Stored XSS.This issue affects SupportCandy: from n/a through 3.2.3.

Exploit
  • EPSS 3.47%
  • Veröffentlicht 19.06.2023 11:15:10
  • Zuletzt bearbeitet 12.12.2024 21:15:07

The SupportCandy WordPress plugin before 3.1.7 does not properly sanitise and escape the `id` parameter for an Agent in the REST API before using it in an SQL statement, leading to an SQL Injection exploitable by users with a role as low as Subscribe...

Exploit
  • EPSS 0.23%
  • Veröffentlicht 19.06.2023 11:15:10
  • Zuletzt bearbeitet 21.11.2024 07:59:19

The SupportCandy WordPress plugin before 3.1.7 does not properly sanitise and escape the agents[] parameter in the set_add_agent_leaves AJAX function before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users s...

Exploit
  • EPSS 75.12%
  • Veröffentlicht 02.05.2023 08:15:10
  • Zuletzt bearbeitet 30.01.2025 15:15:13

The SupportCandy WordPress plugin before 3.1.5 does not validate and escape user input before using it in an SQL statement, which could allow unauthenticated attackers to perform SQL injection attacks

Exploit
  • EPSS 0.15%
  • Veröffentlicht 07.02.2022 16:15:42
  • Zuletzt bearbeitet 21.11.2024 05:53:52

The SupportCandy WordPress plugin before 2.2.7 does not have CRSF check in its wpsc_tickets AJAX action, which could allow attackers to make a logged in admin call it and delete arbitrary tickets via the set_delete_permanently_bulk_ticket setting_act...

Exploit
  • EPSS 0.37%
  • Veröffentlicht 07.02.2022 16:15:42
  • Zuletzt bearbeitet 21.11.2024 05:53:56

The SupportCandy WordPress plugin before 2.2.7 does not sanitise and escape the query string before outputting it back in pages with the [wpsc_create_ticket] shortcode embed, leading to a Reflected Cross-Site Scripting issue

Exploit
  • EPSS 0.2%
  • Veröffentlicht 07.02.2022 16:15:42
  • Zuletzt bearbeitet 21.11.2024 05:53:56

The SupportCandy WordPress plugin before 2.2.7 does not have CSRF check in the wpsc_tickets AJAX action, nor has any sanitisation or escaping in some of the filter fields which could allow attackers to make a logged in user having access to the ticke...

Exploit
  • EPSS 0.18%
  • Veröffentlicht 07.02.2022 16:15:42
  • Zuletzt bearbeitet 21.11.2024 05:53:56

The SupportCandy WordPress plugin before 2.2.7 does not validate and escape the page attribute of its shortcode, which could allow users with a role as low as Contributor to perform Cross-Site Scripting attacks

Exploit
  • EPSS 1.01%
  • Veröffentlicht 07.02.2022 16:15:41
  • Zuletzt bearbeitet 21.11.2024 05:53:51

The SupportCandy WordPress plugin before 2.2.5 does not have authorisation and CSRF checks in its wpsc_tickets AJAX action, which could allow unauthenticated users to call it and delete arbitrary tickets via the set_delete_permanently_bulk_ticket set...

Exploit
  • EPSS 44.88%
  • Veröffentlicht 18.04.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:20:45

An Unrestricted File Upload Vulnerability in the SupportCandy plugin through 2.0.0 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension.