CVE-2024-13567
WordPress vulnerability analysis and mitigation

Overview

The Awesome Support – WordPress HelpDesk & Support Plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to and including 6.3.1 via the 'awesome-support' directory. This vulnerability allows unauthenticated attackers to access sensitive data stored in the /wp-content/uploads/awesome-support directory, which can contain file attachments included in support tickets. The issue was partially patched in version 6.3.1 and fully addressed in version 6.3.2 (NVD, CVE).

Technical details

The vulnerability exists due to improper protection of the uploads directory where support ticket attachments are stored. The plugin uses an MD5 hash with a salt to encode ticket IDs when creating attachment directories, but prior to version 6.3.2, these directories were potentially accessible to unauthorized users. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating it can be exploited remotely without authentication or user interaction (Wordfence).

Impact

The vulnerability allows unauthorized attackers to potentially access sensitive information stored in support ticket attachments. This could include confidential customer data, internal documents, or other private information that was uploaded as part of support tickets. The exposure of such sensitive data could lead to privacy violations and potential compliance issues (NVD).

Mitigation and workarounds

Users should immediately upgrade to version 6.3.2 or later of the Awesome Support plugin, which implements proper directory protection mechanisms. The update includes changes to the file-uploader class and improvements to the security of attachment storage. If immediate updating is not possible, site administrators should consider restricting access to the /wp-content/uploads/awesome-support directory through server configuration (WordPress Plugin).

Additional resources


SourceThis report was generated using AI

Related WordPress vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-0726HIGH8.1
  • nexter-extension
NoYesJan 20, 2026
CVE-2026-0690MEDIUM6.4
  • flatpm-wp
NoYesJan 20, 2026
CVE-2026-0608MEDIUM6.4
  • head-meta-data
NoYesJan 20, 2026
CVE-2026-0548MEDIUM5.4
  • tutor
NoYesJan 20, 2026
CVE-2026-0554MEDIUM4.3
  • notificationx
NoYesJan 20, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management