JS Help Desk – AI-Powered Support & Ticketing System Vulnerability …

JS Help Desk – AI-Powered Support & Ticketing System Vulnerability …

by | Mar 3, 2026 | Plugins

Attack Vectors

JS Help Desk – AI-Powered Support & Ticketing System (slug: js-support-ticket) version 2.8.2 has a High-severity vulnerability (CVSS 7.5, CVE-2023-7337) that can be exploited over the network without a user logging in.

The issue is an unauthenticated SQL injection risk tied to a specific cookie value: js-support-ticket-token-tkstatus. In practical terms, an external attacker can send crafted web requests that include a manipulated cookie to influence how the website’s database is queried.

Because this can be triggered without credentials and without any user interaction, it is particularly relevant for public-facing WordPress sites that use the plugin for customer support and ticketing workflows.

Security Weakness

This vulnerability exists due to an incomplete fix for a prior issue (CVE-2023-50839). According to the published advisory, a second place where the cookie value reaches a database query (“a second sink”) was left with insufficient escaping and the existing SQL query lacked sufficient preparation.

The result is that attacker-supplied input can be appended to an existing database query, enabling the attacker to extract sensitive information from the WordPress database.

Severity is assessed as High because it is remotely exploitable with low effort and can expose confidential data (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

Technical or Business Impacts

Confidentiality exposure: The primary risk described is database data extraction. Depending on what your WordPress database contains, this could include customer contact information, support ticket content, internal notes, or other sensitive operational data stored by the site and its plugins.

Compliance and legal risk: For organizations with privacy obligations, unauthorized access to personal data can trigger notification requirements, regulatory scrutiny, and contractual issues with customers and partners. Even if no evidence of misuse is found, incident response and forensic work can create unplanned costs.

Brand and revenue impact: A support and ticketing plugin sits close to customer communications. Exposure of ticket details or customer identifiers can erode trust, increase churn risk, and create reputational damage that directly affects pipeline and renewals—especially for regulated or enterprise buyers.

Recommended action: Update JS Help Desk – AI-Powered Support & Ticketing System to version 2.8.3 or a newer patched release as the stated remediation.

Similar Attacks

SQL injection is a long-running class of web vulnerability that has been used in high-profile breaches to access sensitive databases. Examples include:

RockYou (FTC case) — SQL injection led to exposure of user credentials

Wyndham (FTC matter) — attackers used vulnerabilities including SQL injection to access customer data

TalkTalk — widely reported SQL injection involvement and major operational fallout

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers