Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-0683 β€” AI Deep Analysis Summary

CVSS 6.5 Β· Medium

Q1What is this vulnerability? (Essence + Consequences)

🚨 **SQL Injection Vulnerability**: The SupportCandy plugin fails to properly escape user input when handling 'number type' custom field filters, allowing authenticated users to inject malicious SQL statements.…

Q2Root Cause? (CWE/Flaw)

πŸ› οΈ **Root Cause**: CWE-89 (SQL Injection). In `class-wpsc-cf-number.php`, numeric values for equality operators are not escaped, and SQL queries do not use prepared statements.…

Q3Who is affected? (Versions/Components)

🌐 **Scope**: All versions (including 3.4.4 and earlier). Component: SupportCandy – Helpdesk & Customer Support Ticket System plugin. Files involved: `class-wpsc-cf-number.php`, `class-wpsc-ticket-list.php`.

Q4What can hackers do? (Privileges/Data)

πŸ” **Attacker Privileges**: Requires only authenticated user access (e.g., Subscriber/Customer).…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Low Exploitation Barrier**: No admin privileges requiredβ€”only a logged-in account (Subscriber level or higher).…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ” **No Public PoC**: No executable proof-of-concept code is provided in the reference links. ⚠️ No evidence of in-the-wild exploitation (no attack reports or samples found).

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check Method**: Verify if SupportCandy plugin is installed and version ≀ 3.4.4. πŸ” Scan files: `class-wpsc-cf-number.php` (L371) and `class-wpsc-ticket-list.php` (L1265, L1288) for unescaped SQL concatenation.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **No Official Patch**: According to available data, no patch is released. However, upgrade to the latest version if a fixed release exists.…

Q9What if no patch? (Workaround)

πŸ›‘οΈ **Temporary Mitigation**: 1. Disable 'number type' custom field filters. 2. Restrict low-privilege users from accessing the ticketing system. 3. Enforce strict numeric input validation (e.g., allow only 0-9, -, .).…

Q10Is it urgent? (Priority Suggestion)

⚠️ **High Priority**: CVSS 7.5 (H/C). Authenticated users can read sensitive data. While data destruction is not possible, the risk of information leakage is extremely high.…