cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-0596,https://securityvulnerability.io/vulnerability/CVE-2024-0596,Unauthorized Access to Data Due to Missing Capability Check,"The Awesome Support – WordPress HelpDesk & Support Plugin plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the editor_html() function in all versions up to, and including, 6.1.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to view password protected and draft posts.",Wordpress,Awesome Support – WordPress Helpdesk & Support Plugin,5.3,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,2024-02-10T06:51:52.976Z,0 CVE-2024-0595,https://securityvulnerability.io/vulnerability/CVE-2024-0595,Unauthorized Access to User Data via Missing Capability Check,"The Awesome Support – WordPress HelpDesk & Support Plugin plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wpas_get_users() function hooked via AJAX in all versions up to, and including, 6.1.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve user data such as emails.",Wordpress,Awesome Support – WordPress HelpDesk & Support Plugin,4.3,MEDIUM,0.0005699999746866524,false,,false,false,false,,false,false,2024-02-10T06:51:52.495Z,0 CVE-2024-0594,https://securityvulnerability.io/vulnerability/CVE-2024-0594,SQL Injection Vulnerability in WordPress HelpDesk & Support Plugin,"The Awesome Support – WordPress HelpDesk & Support Plugin is susceptible to union-based SQL Injection through the 'q' parameter of the wpas_get_users action. This vulnerability arises from inadequate escaping of user-supplied inputs and insufficient preparation within the SQL query. Authenticated attackers with subscriber-level access and above can exploit this flaw to inject additional SQL commands surrounding existing queries, thereby gaining access to sensitive data stored in the database. Users of all versions up to and including 6.1.7 are at risk, prompting urgent attention to mitigate potential data breaches.",Wordpress,Awesome Support – WordPress Helpdesk & Support Plugin,8.8,HIGH,0.0006900000153109431,false,,false,false,false,,false,false,2024-02-10T06:51:51.835Z,0 CVE-2023-51538,https://securityvulnerability.io/vulnerability/CVE-2023-51538,WordPress Awesome Support Plugin <= 6.1.5 is vulnerable to Cross Site Request Forgery (CSRF),"Cross-Site Request Forgery (CSRF) vulnerability in Awesome Support Team Awesome Support – WordPress HelpDesk & Support Plugin.This issue affects Awesome Support – WordPress HelpDesk & Support Plugin: from n/a through 6.1.5. ",Wordpress,Awesome Support – WordPress HelpDesk & Support Plugin,4.3,MEDIUM,0.0008500000112690032,false,,false,false,false,,false,false,2024-01-05T10:15:00.000Z,0 CVE-2023-48323,https://securityvulnerability.io/vulnerability/CVE-2023-48323,WordPress Awesome Support Plugin <= 6.1.4 is vulnerable to Cross Site Request Forgery (CSRF),"A Cross-Site Request Forgery (CSRF) vulnerability exists in the Awesome Support – WordPress HelpDesk & Support Plugin. This weakness allows attackers to manipulate users into executing unwanted actions on a web application where they are authenticated. The vulnerability impacts versions from n/a up to 6.1.4, making it critical for users to update their plugin to secure their WordPress installations against potential exploits.",Wordpress,Awesome Support – WordPress HelpDesk & Support Plugin,8.8,HIGH,0.0008699999889358878,false,,false,false,false,,false,false,2023-11-30T13:15:00.000Z,0