The ELEX WordPress HelpDesk & Customer Ticketing System plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.2.9 via the 'eh_crm_ticket_single_view_client' due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of all support tickets.
References
Configurations
History
26 Nov 2025, 16:49
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:elula:wsdesk:*:*:*:*:free:wordpress:*:* | |
| First Time |
Elula
Elula wsdesk |
|
| References | () https://plugins.trac.wordpress.org/browser/elex-helpdesk-customer-support-ticket-system/trunk/includes/class-crm-ajax-functions.php#L259 - Product | |
| References | () https://plugins.trac.wordpress.org/changeset/3391342/ - Patch | |
| References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/d9ffc0af-9c3d-4f8e-ae0b-e51c0c67dfe1?source=cve - Third Party Advisory |
21 Nov 2025, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-21 13:15
Updated : 2025-11-26 16:49
NVD link : CVE-2025-10039
Mitre link : CVE-2025-10039
CVE.ORG link : CVE-2025-10039
JSON object : View
Products Affected
elula
- wsdesk
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
