CRITICALCVE-2024-7094CVSS 9.8

JS Help Desk – The Ultimate Help Desk & Support Plugin <= 2.8.6 - Inyección de Código PHP No Autenticado a Ejecución Remota de Código

Plataforma

wordpress

Componente

js-support-ticket

Corregido en

2.8.7

AI Confidence: highNVDEPSS 72.0%Revisado: may 2026
Traduciendo a tu idioma…

CVE-2024-7094 is a critical Remote Code Execution (RCE) vulnerability discovered in the JS Help Desk – The Ultimate Help Desk & Support Plugin for WordPress. This flaw allows unauthenticated attackers to execute arbitrary code on the server due to insufficient input sanitization within the 'storeTheme' function. Versions of the plugin up to and including 2.8.6 are affected, and a full fix is available in version 2.8.7.

WordPress

Detecta esta CVE en tu proyecto

Sube tu archivo de dependencias y detecta esta y otras CVEs al instante.

Impacto y Escenarios de Ataquetraduciendo…

The impact of CVE-2024-7094 is severe. Successful exploitation allows an attacker to execute arbitrary PHP code on the web server hosting the WordPress site. This can lead to complete server compromise, including data theft, modification, or deletion. Attackers could also leverage this access to install malware, create backdoors for persistent access, or launch further attacks against other systems on the network. The lack of authentication requirements significantly broadens the attack surface, making it accessible to a wide range of malicious actors.

Contexto de Explotacióntraduciendo…

CVE-2024-7094 was publicly disclosed on August 13, 2024. While no active exploitation campaigns have been definitively confirmed, the CRITICAL severity and ease of exploitation suggest a high likelihood of exploitation attempts. Public proof-of-concept code is likely to emerge, further increasing the risk. This vulnerability is not currently listed on the CISA KEV catalog.

Quién Está en Riesgotraduciendo…

WordPress websites using the JS Help Desk plugin, particularly those running versions prior to 2.8.7, are at significant risk. Shared hosting environments are especially vulnerable, as a compromise of one site can potentially impact others on the same server. Sites with weak WordPress security configurations or those lacking regular plugin updates are also at increased risk.

Pasos de Deteccióntraduciendo…

• wordpress / composer / npm:

grep -r 'storeTheme' /var/www/html/wp-content/plugins/js-help-desk/

• wordpress / composer / npm:

wp plugin list --status=all | grep 'JS Help Desk'

• wordpress / composer / npm:

wp plugin update js-help-desk

• generic web: Check WordPress plugin directory for updates and security advisories related to JS Help Desk.

Cronología del Ataque

  1. Disclosure

    disclosure

Inteligencia de Amenazas

Estado del Exploit

Prueba de ConceptoDesconocido
CISA KEVNO
Exposición en InternetAlta

EPSS

71.96% (99% percentil)

CISA SSVC

Explotaciónnone
Automatizableyes
Impacto Técnicototal

Vector CVSS

INTELIGENCIA DE AMENAZAS· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H9.8CRITICALAttack VectorNetworkCómo el atacante alcanza el objetivoAttack ComplexityLowCondiciones necesarias para explotarPrivileges RequiredNoneNivel de autenticación requeridoUser InteractionNoneSi la víctima debe realizar una acciónScopeUnchangedImpacto más allá del componente afectadoConfidentialityHighRiesgo de exposición de datos sensiblesIntegrityHighRiesgo de modificación no autorizada de datosAvailabilityHighRiesgo de interrupción del servicionextguardhq.com · Puntuación Base CVSS v3.1
¿Qué significan estas métricas?
Attack Vector
Red — explotable remotamente por internet. Sin acceso físico ni local. Mayor superficie de ataque.
Attack Complexity
Baja — sin condiciones especiales. El atacante puede explotar de forma confiable sin configuraciones raras.
Privileges Required
Ninguno — sin autenticación. No se necesitan credenciales para explotar.
User Interaction
Ninguna — el ataque es automático y silencioso. La víctima no hace nada.
Scope
Sin cambio — el impacto se limita al componente vulnerable.
Confidentiality
Alto — pérdida total de confidencialidad. El atacante puede leer todos los datos.
Integrity
Alto — el atacante puede escribir, modificar o eliminar cualquier dato.
Availability
Alto — caída completa o agotamiento de recursos. Denegación de servicio total.

Software Afectado

Componentejs-support-ticket
Proveedorrabilal
Rango afectadoCorregido en
* – 2.8.62.8.7

Información del paquete

Instalaciones activas
8KConocido
Valoración del plugin
3.8
Requiere WordPress
5.5+
Compatible hasta
6.9.4
Requiere PHP
7.4+

Clasificación de Debilidad (CWE)

Cronología

  1. Reservado
  2. Publicada
  3. EPSS actualizado

Mitigación y Workaroundstraduciendo…

The primary mitigation for CVE-2024-7094 is to immediately upgrade the JS Help Desk plugin to version 2.8.7 or later. If upgrading is not immediately feasible, consider implementing a temporary workaround by restricting access to the 'storeTheme' function. This could involve modifying the plugin's code (with caution and thorough testing) or using a WordPress security plugin to block access to the vulnerable endpoint. Monitor WordPress access logs for suspicious activity related to the 'storeTheme' function. After upgrading, confirm the fix by attempting to trigger the vulnerability via a controlled test – ensure no code execution occurs.

Cómo corregirlo

Actualice el plugin JS Help Desk – The Ultimate Help Desk & Support Plugin a la versión 2.8.7 o superior. Esta versión corrige la vulnerabilidad de inyección de código PHP que permite la ejecución remota de código.

Boletín de seguridad CVE

Análisis de vulnerabilidades y alertas críticas directamente en tu correo.

Preguntas frecuentestraduciendo…

What is CVE-2024-7094 — RCE in JS Help Desk WordPress Plugin?

CVE-2024-7094 is a critical Remote Code Execution vulnerability in the JS Help Desk WordPress plugin, allowing attackers to execute code on the server if you're using versions up to 2.8.6.

Am I affected by CVE-2024-7094 in JS Help Desk WordPress Plugin?

Yes, if you are using the JS Help Desk plugin version 2.8.6 or earlier, you are vulnerable to this RCE vulnerability. Upgrade immediately.

How do I fix CVE-2024-7094 in JS Help Desk WordPress Plugin?

Upgrade the JS Help Desk plugin to version 2.8.7 or later to resolve this vulnerability. If immediate upgrade isn't possible, consider temporary workarounds like restricting access to the 'storeTheme' function.

Is CVE-2024-7094 being actively exploited?

While no confirmed active exploitation campaigns have been reported, the CRITICAL severity and ease of exploitation suggest a high likelihood of exploitation attempts.

Where can I find the official JS Help Desk advisory for CVE-2024-7094?

Refer to the JS Help Desk plugin's official website and WordPress plugin repository for the latest security advisory and update information.

¿Tu proyecto está afectado?

Sube tu archivo de dependencias y detecta esta y otras CVEs al instante.