Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-1251 β€” AI Deep Analysis Summary

CVSS 5.4 Β· Medium

Q1What is this vulnerability? (Essence + Consequences)

🚨 **IDOR Vulnerability**: The SupportCandy plugin does not validate the user-controlled `description_attachments` parameter in the `add_reply` function.…

Q2Root Cause? (CWE/Flaw)

πŸ› οΈ **Root Cause**: CWE-284 (Insecure Direct Object References). ❌ Lack of permission checks on user-supplied attachment IDs allows arbitrary file association.

Q3Who is affected? (Versions/Components)

⚠️ **Scope**: All versions (including 3.4.4 and earlier). πŸ’» Component: WordPress Plugin SupportCandy – Helpdesk & Customer Support Ticket System.

Q4What can hackers do? (Privileges/Data)

πŸ”“ **What Hackers Can Do**: Requires only subscriber-level or higher privileges. πŸ“Ž Steal attachments uploaded by others, bind them to their own tickets, enabling data theft and privilege escalation.

Q5Is exploitation threshold high? (Auth/Config)

πŸ” **Low Exploitation Barrier**: Only authenticated users (subscriber level or above) are needed. 🌐 No special configuration required; attackers can directly submit malicious parameters via the API.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ” **No Public PoC**: Official data does not provide a PoC. ⚠️ No known in-the-wild exploitation reports, but risk is high; immediate remediation is recommended.

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check Method**: Inspect the `class-wpsc-individual-ticket.php` file and locate the `add_reply` function. πŸ” Check whether the `description_attachments` parameter validates user permissions.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Officially Fixed**: Refer to Trac changeset #3448376. πŸ›‘οΈ Patch has been released; upgrade to the latest version.

Q9What if no patch? (Workaround)

πŸ›‘οΈ **Temporary Mitigation**: Disable attachment upload functionality or restrict ticket operation permissions.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **High Priority!** CVSS 3.1 (C:L/I:L/A:N), high risk of data leakage. ⚠️ Immediate upgrade or temporary hardening recommended to prevent exploitation.