Vulnerability Details CVE-2024-8632
The KB Support – WordPress Help Desk and Knowledge Base plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on the 'kbs_ajax_load_front_end_replies' and 'kbs_ajax_mark_reply_as_read' functions in all versions up to, and including, 1.6.6. This makes it possible for unauthenticated attackers to read replies of any ticket, and mark any reply as read.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 27.0%
CVSS Severity
CVSS v3 Score 6.5
Products affected by CVE-2024-8632
-
cpe:2.3:a:logon:kb_support:-
-
cpe:2.3:a:logon:kb_support:0.9
-
cpe:2.3:a:logon:kb_support:0.9.1
-
cpe:2.3:a:logon:kb_support:0.9.2
-
cpe:2.3:a:logon:kb_support:0.9.3
-
cpe:2.3:a:logon:kb_support:0.9.4
-
cpe:2.3:a:logon:kb_support:0.9.5
-
cpe:2.3:a:logon:kb_support:1.0
-
cpe:2.3:a:logon:kb_support:1.0.1
-
cpe:2.3:a:logon:kb_support:1.0.2
-
cpe:2.3:a:logon:kb_support:1.0.3
-
cpe:2.3:a:logon:kb_support:1.0.4
-
cpe:2.3:a:logon:kb_support:1.0.5
-
cpe:2.3:a:logon:kb_support:1.0.6
-
cpe:2.3:a:logon:kb_support:1.0.7
-
cpe:2.3:a:logon:kb_support:1.0.8
-
cpe:2.3:a:logon:kb_support:1.0.9
-
cpe:2.3:a:logon:kb_support:1.1
-
cpe:2.3:a:logon:kb_support:1.1.1
-
cpe:2.3:a:logon:kb_support:1.1.10
-
cpe:2.3:a:logon:kb_support:1.1.11
-
cpe:2.3:a:logon:kb_support:1.1.12
-
cpe:2.3:a:logon:kb_support:1.1.13
-
cpe:2.3:a:logon:kb_support:1.1.2
-
cpe:2.3:a:logon:kb_support:1.1.3
-
cpe:2.3:a:logon:kb_support:1.1.4
-
cpe:2.3:a:logon:kb_support:1.1.5
-
cpe:2.3:a:logon:kb_support:1.1.6
-
cpe:2.3:a:logon:kb_support:1.1.7
-
cpe:2.3:a:logon:kb_support:1.1.8
-
cpe:2.3:a:logon:kb_support:1.1.9
-
cpe:2.3:a:logon:kb_support:1.2
-
cpe:2.3:a:logon:kb_support:1.2.1
-
cpe:2.3:a:logon:kb_support:1.2.10
-
cpe:2.3:a:logon:kb_support:1.2.2
-
cpe:2.3:a:logon:kb_support:1.2.3
-
cpe:2.3:a:logon:kb_support:1.2.4
-
cpe:2.3:a:logon:kb_support:1.2.5
-
cpe:2.3:a:logon:kb_support:1.2.6
-
cpe:2.3:a:logon:kb_support:1.2.7
-
cpe:2.3:a:logon:kb_support:1.2.8
-
cpe:2.3:a:logon:kb_support:1.2.9
-
cpe:2.3:a:logon:kb_support:1.3
-
cpe:2.3:a:logon:kb_support:1.3.1
-
cpe:2.3:a:logon:kb_support:1.3.2
-
cpe:2.3:a:logon:kb_support:1.3.3
-
cpe:2.3:a:logon:kb_support:1.3.4
-
cpe:2.3:a:logon:kb_support:1.3.5
-
cpe:2.3:a:logon:kb_support:1.3.6
-
cpe:2.3:a:logon:kb_support:1.4
-
cpe:2.3:a:logon:kb_support:1.4.1
-
cpe:2.3:a:logon:kb_support:1.4.10
-
cpe:2.3:a:logon:kb_support:1.4.2
-
cpe:2.3:a:logon:kb_support:1.4.3
-
cpe:2.3:a:logon:kb_support:1.4.4
-
cpe:2.3:a:logon:kb_support:1.4.5
-
cpe:2.3:a:logon:kb_support:1.4.6
-
cpe:2.3:a:logon:kb_support:1.4.7
-
cpe:2.3:a:logon:kb_support:1.4.8
-
cpe:2.3:a:logon:kb_support:1.4.9
-
cpe:2.3:a:logon:kb_support:1.5
-
cpe:2.3:a:logon:kb_support:1.5.1
-
cpe:2.3:a:logon:kb_support:1.5.2
-
cpe:2.3:a:logon:kb_support:1.5.3
-
cpe:2.3:a:logon:kb_support:1.5.6
-
cpe:2.3:a:logon:kb_support:1.5.8
-
cpe:2.3:a:logon:kb_support:1.5.81
-
cpe:2.3:a:logon:kb_support:1.5.83
-
cpe:2.3:a:logon:kb_support:1.5.84
-
cpe:2.3:a:logon:kb_support:1.5.85
-
cpe:2.3:a:logon:kb_support:1.5.86
-
cpe:2.3:a:logon:kb_support:1.5.87
-
cpe:2.3:a:logon:kb_support:1.5.88
-
cpe:2.3:a:logon:kb_support:1.5.89
-
cpe:2.3:a:logon:kb_support:1.5.90
-
cpe:2.3:a:logon:kb_support:1.5.91
-
cpe:2.3:a:logon:kb_support:1.5.92
-
cpe:2.3:a:logon:kb_support:1.6.0
-
cpe:2.3:a:logon:kb_support:1.6.1
-
cpe:2.3:a:logon:kb_support:1.6.2
-
cpe:2.3:a:logon:kb_support:1.6.3
-
cpe:2.3:a:logon:kb_support:1.6.4
-
cpe:2.3:a:logon:kb_support:1.6.5
-
cpe:2.3:a:logon:kb_support:1.6.6