Home

Description

The SupportCandy – Helpdesk & Customer Support Ticket System plugin for WordPress is vulnerable to SQL Injection via the Number-type custom field filter in all versions up to, and including, 3.4.4. This is due to insufficient escaping on the user-supplied operand value when using the equals operator and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above (customers), to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PUBLISHED Reserved 2026-01-07 | Published 2026-01-31 | Updated 2026-01-31 | Assigner Wordfence




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

Default status
unaffected

* (semver)
affected

Timeline

2026-01-07:Vendor Notified
2026-01-30:Disclosed

Credits

Supakiad S. finder

References

www.wordfence.com/...-bc7d-436c-968c-631fd6a686ab?source=cve

plugins.trac.wordpress.org/...ets/class-wpsc-ticket-list.php

plugins.trac.wordpress.org/...ets/class-wpsc-ticket-list.php

plugins.trac.wordpress.org/...types/class-wpsc-cf-number.php

plugins.trac.wordpress.org/changeset/3448376/

cve.org (CVE-2026-0683)

nvd.nist.gov (CVE-2026-0683)

Download JSON