cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-2805,https://securityvulnerability.io/vulnerability/CVE-2023-2805,SupportCandy < 3.1.7 - Admin+ SQLi,"The SupportCandy plugin for WordPress prior to version 3.1.7 contains a flaw in the handling of the agents[] parameter within the set_add_agent_leaves AJAX function. This issue arises due to improper sanitization and escaping of the parameter before it is used in a SQL statement. As a result, high privilege users, such as administrators, can exploit this vulnerability, potentially leading to unauthorized access or manipulation of the database.",Wordpress,Supportcandy,7.2,HIGH,0.0009399999980814755,false,,false,false,false,,false,false,2023-06-19T11:15:00.000Z,0 CVE-2023-2719,https://securityvulnerability.io/vulnerability/CVE-2023-2719,SupportCandy < 3.1.7 - Subscriber+ SQLi,"The SupportCandy plugin for WordPress, prior to version 3.1.7, is susceptible to an SQL Injection vulnerability due to improper sanitization and escaping of the 'id' parameter used in the REST API for an Agent. This weakness allows users with minimal privileges, such as subscribers, to execute malicious SQL queries, potentially compromising site integrity and data security.",Wordpress,Supportcandy,8.8,HIGH,0.0009399999980814755,false,,false,false,false,,false,false,2023-06-19T11:15:00.000Z,0 CVE-2023-1730,https://securityvulnerability.io/vulnerability/CVE-2023-1730,SupportCandy < 3.1.5 - Unauthenticated SQLi,"The SupportCandy plugin for WordPress prior to version 3.1.5 is susceptible to SQL injection due to inadequate validation and escaping of user inputs. This vulnerability permits unauthenticated users to craft malicious input that can manipulate SQL queries executed by the plugin. Exploiting this flaw could lead to unauthorized data access or alterations, making it essential for users to update their installations to ensure the integrity of their systems.",Wordpress,Supportcandy,9.8,CRITICAL,0.12770000100135803,false,,false,false,true,true,false,false,2023-05-02T08:15:00.000Z,0 CVE-2021-24880,https://securityvulnerability.io/vulnerability/CVE-2021-24880,SupportCandy < 2.2.7 - Contributor+ Stored Cross-Site Scripting,"The SupportCandy WordPress plugin before 2.2.7 does not validate and escape the page attribute of its shortcode, which could allow users with a role as low as Contributor to perform Cross-Site Scripting attacks",Wordpress,Supportcandy – Helpdesk & Support Ticket System,5.4,MEDIUM,0.000539999979082495,false,,false,false,false,,false,false,2022-02-07T15:47:12.000Z,0 CVE-2021-24879,https://securityvulnerability.io/vulnerability/CVE-2021-24879,SupportCandy < 2.2.7 - CSRF to Cross-Site Scripting,"The SupportCandy WordPress plugin before 2.2.7 does not have CSRF check in the wpsc_tickets AJAX action, nor has any sanitisation or escaping in some of the filter fields which could allow attackers to make a logged in user having access to the ticket lists dashboard set an arbitrary filter (stored in their cookies) with an XSS payload in it.",Wordpress,Supportcandy – Helpdesk & Support Ticket System,8.8,HIGH,0.001339999958872795,false,,false,false,false,,false,false,2022-02-07T15:47:11.000Z,0 CVE-2021-24878,https://securityvulnerability.io/vulnerability/CVE-2021-24878,SupportCandy < 2.2.7 - Reflected Cross-Site Scripting,"The SupportCandy WordPress plugin before 2.2.7 does not sanitise and escape the query string before outputting it back in pages with the [wpsc_create_ticket] shortcode embed, leading to a Reflected Cross-Site Scripting issue",Wordpress,Supportcandy – Helpdesk & Support Ticket System,6.1,MEDIUM,0.0007999999797903001,false,,false,false,false,,false,false,2022-02-07T15:47:10.000Z,0 CVE-2021-24843,https://securityvulnerability.io/vulnerability/CVE-2021-24843,SupportCandy < 2.2.7 - Arbitrary Ticket Deletion via CSRF,"The SupportCandy WordPress plugin before 2.2.7 does not have CRSF check in its wpsc_tickets AJAX action, which could allow attackers to make a logged in admin call it and delete arbitrary tickets via the set_delete_permanently_bulk_ticket setting_action.",Wordpress,Supportcandy – Helpdesk & Support Ticket System,6.5,MEDIUM,0.0006099999882280827,false,,false,false,false,,false,false,2022-02-07T15:47:10.000Z,0 CVE-2021-24839,https://securityvulnerability.io/vulnerability/CVE-2021-24839,SupportCandy < 2.2.5 - Unauthenticated Arbitrary Ticket Deletion,"The SupportCandy WordPress plugin before 2.2.5 does not have authorisation and CSRF checks in its wpsc_tickets AJAX action, which could allow unauthenticated users to call it and delete arbitrary tickets via the set_delete_permanently_bulk_ticket setting_action. Other actions may be affected as well.",Wordpress,Supportcandy – Helpdesk & Support Ticket System,7.5,HIGH,0.001509999972768128,false,,false,false,false,,false,false,2022-02-07T15:47:09.000Z,0 CVE-2019-11223,https://securityvulnerability.io/vulnerability/CVE-2019-11223,,An Unrestricted File Upload Vulnerability in the SupportCandy plugin through 2.0.0 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension.,Wordpress,Supportcandy,9.8,CRITICAL,0.052390001714229584,false,,false,false,true,true,false,false,2019-04-18T17:08:18.000Z,0