Lucene search

K

5 matches found

CVE
CVE
added 2022/02/28 9:15 a.m.81 views

CVE-2021-24823

The Support Board WordPress plugin before 3.3.6 does not have any CSRF checks in actions handled by the include/ajax.php file, which could allow attackers to make logged in users do unwanted actions. For example, make an admin delete arbitrary files

8.1CVSS8AI score0.00157EPSS
CVE
CVE
added 2021/09/20 10:15 a.m.44 views

CVE-2021-24741

The Support Board WordPress plugin before 3.3.4 does not escape multiple POST parameters (such as status_code, department, user_id, conversation_id, conversation_status_code, and recipient_id) before using them in SQL statements, leading to SQL injections which are exploitable by unauthenticated us...

9.8CVSS9.8AI score0.58256EPSS
CVE
CVE
added 2021/11/08 6:15 p.m.35 views

CVE-2021-24807

The Support Board WordPress plugin before 3.3.5 allows Authenticated (Agent+) users to perform Cross-Site Scripting attacks by placing a payload in the notes field, when an administrator or any authenticated user go to the chat the XSS will be automatically executed.

5.4CVSS5.1AI score0.03097EPSS
CVE
CVE
added 2025/07/09 12:15 a.m.18 views

CVE-2025-4828

The Support Board plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the sb_file_delete function in all versions up to, and including, 3.8.0. This makes it possible for attackers to delete arbitrary files on the server, which can easily lead to...

9.8CVSS7.3AI score0.01053EPSS
CVE
CVE
added 2025/07/09 12:15 a.m.16 views

CVE-2025-4855

The Support Board plugin for WordPress is vulnerable to unauthorized access/modification/deletion of data due to use of hardcoded default secrets in the sb_encryption() function in all versions up to, and including, 3.8.0. This makes it possible for unauthenticated attackers to bypass authorization...

9.8CVSS7.1AI score0.01053EPSS