Browse all 12 CVE security advisories affecting awesomesupport. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Awesomesupport is a WordPress help desk plugin designed for customer support ticket management. Historically, it has been vulnerable to multiple remote code execution (RCE) flaws, cross-site scripting (XSS), and privilege escalation issues, with 12 CVEs documented. Notable security characteristics include insufficient input validation and improper access controls in its ticketing system. While no major public incidents have been widely reported, the consistent pattern of vulnerabilities suggests potential risks for unpatched installations. Regular updates and proper configuration are essential to mitigate these security concerns.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-58662 | WordPress Awesome Support plugin <= 6.3.5 - Deserialization of untrusted data vulnerability — Awesome SupportCWE-502 | 7.2 | High | 2025-09-22 |
| CVE-2025-53340 | WordPress Awesome Support plugin <= 6.3.6 - Sensitive Data Exposure vulnerability — Awesome SupportCWE-862 | 5.3 | Medium | 2025-09-09 |
| CVE-2024-54289 | WordPress Awesome Support plugin <= 6.3.1 - Broken Access Control vulnerability — Awesome SupportCWE-862 | 6.5 | Medium | 2024-12-13 |
| CVE-2023-48324 | WordPress Awesome Support HelpDesk plugin <= 6.1.4 - Broken Access control vulnerability — Awesome SupportCWE-862 | 5.4 | Medium | 2024-12-09 |
| CVE-2023-49757 | WordPress Awesome Support plugin <= 6.1.10 - Broken Access Control + CSRF vulnerability — Awesome SupportCWE-862 | 5.4 | Medium | 2024-12-09 |
| CVE-2023-49857 | WordPress Awesome Support plugin <= 6.1.7 - Broken Access Control vulnerability — Awesome SupportCWE-862 | 6.5 | Medium | 2024-12-09 |
This page lists every published CVE security advisory associated with awesomesupport. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.